LLVM Language Reference Manual

Abstract

This document is a reference manual for the LLVM assembly language. LLVMis a Static Single Assignment (SSA) based representation that providestype safety, low-level operations, flexibility, and the capability ofrepresenting ‘all’ high-level languages cleanly. It is the common coderepresentation used throughout all phases of the LLVM compilationstrategy.

Introduction

The LLVM code representation is designed to be used in three differentforms: as an in-memory compiler IR, as an on-disk bitcode representation(suitable for fast loading by a Just-In-Time compiler), and as a humanreadable assembly language representation. This allows LLVM to provide apowerful intermediate representation for efficient compilertransformations and analysis, while providing a natural means to debugand visualize the transformations. The three different forms of LLVM areall equivalent. This document describes the human readablerepresentation and notation.

The LLVM representation aims to be light-weight and low-level whilebeing expressive, typed, and extensible at the same time. It aims to bea “universal IR” of sorts, by being at a low enough level thathigh-level ideas may be cleanly mapped to it (similar to howmicroprocessors are “universal IR’s”, allowing many source languages tobe mapped to them). By providing type information, LLVM can be used asthe target of optimizations: for example, through pointer analysis, itcan be proven that a C automatic variable is never accessed outside ofthe current function, allowing it to be promoted to a simple SSA valueinstead of a memory location.

Well-Formedness

It is important to note that this document describes ‘well formed’ LLVMassembly language. There is a difference between what the parser acceptsand what is considered ‘well formed’. For example, the followinginstruction is syntactically okay, but not well formed:

  1. %x = add i32 1, %x

because the definition of %x does not dominate all of its uses. TheLLVM infrastructure provides a verification pass that may be used toverify that an LLVM module is well formed. This pass is automaticallyrun by the parser after parsing input assembly and by the optimizerbefore it outputs bitcode. The violations pointed out by the verifierpass indicate bugs in transformation passes or input to the parser.

Identifiers

LLVM identifiers come in two basic types: global and local. Globalidentifiers (functions, global variables) begin with the '@'character. Local identifiers (register names, types) begin with the'%' character. Additionally, there are three different formats foridentifiers, for different purposes:

  • Named values are represented as a string of characters with theirprefix. For example, %foo, @DivisionByZero,%a.really.long.identifier. The actual regular expression used is‘[%@][-a-zA-Z$._][-a-zA-Z$._0-9]*’. Identifiers that require othercharacters in their names can be surrounded with quotes. Specialcharacters may be escaped using "\xx" where xx is the ASCIIcode for the character in hexadecimal. In this way, any character canbe used in a name value, even quotes themselves. The "\01" prefixcan be used on global values to suppress mangling.
  • Unnamed values are represented as an unsigned numeric value withtheir prefix. For example, %12, @2, %44.
  • Constants, which are described in the section Constants below.LLVM requires that values start with a prefix for two reasons: Compilersdon’t need to worry about name clashes with reserved words, and the setof reserved words may be expanded in the future without penalty.Additionally, unnamed identifiers allow a compiler to quickly come upwith a temporary variable without having to avoid symbol tableconflicts.

Reserved words in LLVM are very similar to reserved words in otherlanguages. There are keywords for different opcodes (‘add’,‘bitcast’, ‘ret’, etc…), for primitive type names (‘void’,‘i32’, etc…), and others. These reserved words cannot conflictwith variable names, because none of them start with a prefix character('%' or '@').

Here is an example of LLVM code to multiply the integer variable‘%X’ by 8:

The easy way:

  1. %result = mul i32 %X, 8

After strength reduction:

  1. %result = shl i32 %X, 3

And the hard way:

  1. %0 = add i32 %X, %X ; yields i32:%0
  2. %1 = add i32 %0, %0 ; yields i32:%1
  3. %result = add i32 %1, %1

This last way of multiplying %X by 8 illustrates several importantlexical features of LLVM:

  • Comments are delimited with a ‘;’ and go until the end of line.
  • Unnamed temporaries are created when the result of a computation isnot assigned to a named value.
  • Unnamed temporaries are numbered sequentially (using a per-functionincrementing counter, starting with 0). Note that basic blocks and unnamedfunction parameters are included in this numbering. For example, if theentry basic block is not given a label name and all function parameters arenamed, then it will get number 0.It also shows a convention that we follow in this document. Whendemonstrating instructions, we will follow an instruction with a commentthat defines the type and name of value produced.

High Level Structure

Module Structure

LLVM programs are composed of Module’s, each of which is atranslation unit of the input programs. Each module consists offunctions, global variables, and symbol table entries. Modules may becombined together with the LLVM linker, which merges function (andglobal variable) definitions, resolves forward declarations, and mergessymbol table entries. Here is an example of the “hello world” module:

  1. ; Declare the string constant as a global constant.
  2. @.str = private unnamed_addr constant [13 x i8] c"hello world\0A\00"
  3.  
  4. ; External declaration of the puts function
  5. declare i32 @puts(i8* nocapture) nounwind
  6.  
  7. ; Definition of main function
  8. define i32 @main() { ; i32()*
  9. ; Convert [13 x i8]* to i8*...
  10. %cast210 = getelementptr [13 x i8], [13 x i8]* @.str, i64 0, i64 0
  11.  
  12. ; Call puts function to write out the string to stdout.
  13. call i32 @puts(i8* %cast210)
  14. ret i32 0
  15. }
  16.  
  17. ; Named metadata
  18. !0 = !{i32 42, null, !"string"}
  19. !foo = !{!0}

This example is made up of a global variable named“.str”, an external declaration of the “puts” function, afunction definition for “main” andnamed metadatafoo”.

In general, a module is made up of a list of global values (where bothfunctions and global variables are global values). Global values arerepresented by a pointer to a memory location (in this case, a pointerto an array of char, and a pointer to a function), and have one of thefollowing linkage types.

Linkage Types

All Global Variables and Functions have one of the following types oflinkage:

  • private
  • Global values with “private” linkage are only directlyaccessible by objects in the current module. In particular, linkingcode into a module with a private global value may cause theprivate to be renamed as necessary to avoid collisions. Because thesymbol is private to the module, all references can be updated. Thisdoesn’t show up in any symbol table in the object file.
  • internal
  • Similar to private, but the value shows as a local symbol(STB_LOCAL in the case of ELF) in the object file. Thiscorresponds to the notion of the ‘static’ keyword in C.
  • available_externally
  • Globals with “available_externally” linkage are never emitted intothe object file corresponding to the LLVM module. From the linker’sperspective, an available_externally global is equivalent toan external declaration. They exist to allow inlining and otheroptimizations to take place given knowledge of the definition of theglobal, which is known to be somewhere outside the module. Globalswith available_externally linkage are allowed to be discarded atwill, and allow inlining and other optimizations. This linkage type isonly allowed on definitions, not declarations.
  • linkonce
  • Globals with “linkonce” linkage are merged with other globals ofthe same name when linkage occurs. This can be used to implementsome forms of inline functions, templates, or other code which mustbe generated in each translation unit that uses it, but where thebody may be overridden with a more definitive definition later.Unreferenced linkonce globals are allowed to be discarded. Notethat linkonce linkage does not actually allow the optimizer toinline the body of this function into callers because it doesn’tknow if this definition of the function is the definitive definitionwithin the program or whether it will be overridden by a strongerdefinition. To enable inlining and other optimizations, use“linkonce_odr” linkage.
  • weak
  • weak” linkage has the same merging semantics as linkoncelinkage, except that unreferenced globals with weak linkage maynot be discarded. This is used for globals that are declared “weak”in C source code.
  • common
  • common” linkage is most similar to “weak” linkage, but theyare used for tentative definitions in C, such as “int X;” atglobal scope. Symbols with “common” linkage are merged in thesame way as weak symbols, and they may not be deleted ifunreferenced. common symbols may not have an explicit section,must have a zero initializer, and may not be marked‘constant’. Functions and aliases may not havecommon linkage.
  • appending
  • appending” linkage may only be applied to global variables ofpointer to array type. When two global variables with appendinglinkage are linked together, the two global arrays are appendedtogether. This is the LLVM, typesafe, equivalent of having thesystem linker append together “sections” with identical names when.o files are linked.

Unfortunately this doesn’t correspond to any feature in .o files, so itcan only be used for variables like llvm.global_ctors which llvminterprets specially.

  • extern_weak
  • The semantics of this linkage follow the ELF object file model: thesymbol is weak until linked, if not linked, the symbol becomes nullinstead of being an undefined reference.
  • linkonce_odr, weak_odr
  • Some languages allow differing globals to be merged, such as twofunctions with different semantics. Other languages, such asC++, ensure that only equivalent globals are ever merged (the“one definition rule” — “ODR”). Such languages can use thelinkonce_odr and weak_odr linkage types to indicate that theglobal will only be merged with equivalent globals. These linkagetypes are otherwise the same as their non-odr versions.
  • external
  • If none of the above identifiers are used, the global is externallyvisible, meaning that it participates in linkage and can be used toresolve external symbol references.

It is illegal for a function declaration to have any linkage typeother than external or extern_weak.

Calling Conventions

LLVM functions, calls andinvokes can all have an optional calling conventionspecified for the call. The calling convention of any pair of dynamiccaller/callee must match, or the behavior of the program is undefined.The following calling conventions are supported by LLVM, and more may beadded in the future:

  • ccc” - The C calling convention
  • This calling convention (the default if no other calling conventionis specified) matches the target C calling conventions. This callingconvention supports varargs function calls and tolerates somemismatch in the declared prototype and implemented declaration ofthe function (as does normal C).
  • fastcc” - The fast calling convention
  • This calling convention attempts to make calls as fast as possible(e.g. by passing things in registers). This calling conventionallows the target to use whatever tricks it wants to produce fastcode for the target, without having to conform to an externallyspecified ABI (Application Binary Interface). Tail calls can onlybe optimized when this, the tailcc, the GHC or the HiPE convention isused. This calling convention does notsupport varargs and requires the prototype of all callees to exactlymatch the prototype of the function definition.
  • coldcc” - The cold calling convention
  • This calling convention attempts to make code in the caller asefficient as possible under the assumption that the call is notcommonly executed. As such, these calls often preserve all registersso that the call does not break any live ranges in the caller side.This calling convention does not support varargs and requires theprototype of all callees to exactly match the prototype of thefunction definition. Furthermore the inliner doesn’t consider such functioncalls for inlining.
  • cc 10” - GHC convention
  • This calling convention has been implemented specifically for use bythe Glasgow Haskell Compiler (GHC).It passes everything in registers, going to extremes to achieve thisby disabling callee save registers. This calling convention shouldnot be used lightly but only for specific situations such as analternative to the register pinning performance technique oftenused when implementing functional programming languages. At themoment only X86 supports this convention and it has the followinglimitations:

    • On X86-32 only supports up to 4 bit type parameters. Nofloating-point types are supported.
    • On X86-64 only supports up to 10 bit type parameters and 6floating-point parameters.This calling convention supports tail calloptimization but requires both thecaller and callee are using it.
  • cc 11” - The HiPE calling convention

  • This calling convention has been implemented specifically for use bythe High-Performance Erlang(HiPE) compiler, _the_native code compiler of the Ericsson’s Open Source Erlang/OTPsystem. It uses moreregisters for argument passing than the ordinary C callingconvention and defines no callee-saved registers. The callingconvention properly supports tail calloptimization but requires that both thecaller and the callee use it. It uses a _register pinning_mechanism, similar to GHC’s convention, for keeping frequentlyaccessed runtime components pinned to specific hardware registers.At the moment only X86 supports this convention (both 32 and 64bit).
  • webkit_jscc” - WebKit’s JavaScript calling convention
  • This calling convention has been implemented for WebKit FTL JIT. It passes arguments on thestack right to left (as cdecl does), and returns a value in theplatform’s customary return register.
  • anyregcc” - Dynamic calling convention for code patching
  • This is a special convention that supports patching an arbitrary codesequence in place of a call site. This convention forces the callarguments into registers but allows them to be dynamicallyallocated. This can currently only be used with calls tollvm.experimental.patchpoint because only this intrinsic recordsthe location of its arguments in a side table. See Stack maps and patch points in LLVM.
  • preservemostcc” - The _PreserveMost calling convention
  • This calling convention attempts to make the code in the caller asunintrusive as possible. This convention behaves identically to the _C_calling convention on how arguments and return values are passed, but ituses a different set of caller/callee-saved registers. This alleviates theburden of saving and recovering a large register set before and after thecall in the caller. If the arguments are passed in callee-saved registers,then they will be preserved by the callee across the call. This doesn’tapply for values returned in callee-saved registers.

    • On X86-64 the callee preserves all general purpose registers, except forR11. R11 can be used as a scratch register. Floating-point registers(XMMs/YMMs) are not preserved and need to be saved by the caller.The idea behind this convention is to support calls to runtime functionsthat have a hot path and a cold path. The hot path is usually a small pieceof code that doesn’t use many registers. The cold path might need to call out toanother function and therefore only needs to preserve the caller-savedregisters, which haven’t already been saved by the caller. ThePreserveMost calling convention is very similar to the cold callingconvention in terms of caller/callee-saved registers, but they are used fordifferent types of function calls. coldcc is for function calls that arerarely executed, whereas preserve_mostcc function calls are intended to beon the hot path and definitely executed a lot. Furthermore _preserve_mostcc_doesn’t prevent the inliner from inlining the function call.

This calling convention will be used by a future version of the ObjectiveCruntime and should therefore still be considered experimental at this time.Although this convention was created to optimize certain runtime calls tothe ObjectiveC runtime, it is not limited to this runtime and might be usedby other runtimes in the future too. The current implementation onlysupports X86-64, but the intention is to support more architectures in thefuture.

  • preserveallcc” - The _PreserveAll calling convention
  • This calling convention attempts to make the code in the caller even lessintrusive than the PreserveMost calling convention. This callingconvention also behaves identical to the C calling convention on howarguments and return values are passed, but it uses a different set ofcaller/callee-saved registers. This removes the burden of saving andrecovering a large register set before and after the call in the caller. Ifthe arguments are passed in callee-saved registers, then they will bepreserved by the callee across the call. This doesn’t apply for valuesreturned in callee-saved registers.

    • On X86-64 the callee preserves all general purpose registers, except forR11. R11 can be used as a scratch register. Furthermore it also preservesall floating-point registers (XMMs/YMMs).The idea behind this convention is to support calls to runtime functionsthat don’t need to call out to any other functions.

This calling convention, like the PreserveMost calling convention, will beused by a future version of the ObjectiveC runtime and should be consideredexperimental at this time.

  • cxxfast_tlscc” - The _CXX_FAST_TLS calling convention for access functions
  • Clang generates an access function to access C++-style TLS. The accessfunction generally has an entry block, an exit block and an initializationblock that is run at the first time. The entry and exit blocks can accessa few TLS IR variables, each access will be lowered to a platform-specificsequence.

This calling convention aims to minimize overhead in the caller bypreserving as many registers as possible (all the registers that arepreserved on the fast path, composed of the entry and exit blocks).

This calling convention behaves identical to the C calling convention onhow arguments and return values are passed, but it uses a different set ofcaller/callee-saved registers.

Given that each platform has its own lowering sequence, hence its own setof preserved registers, we can’t use the existing PreserveMost.

  • On X86-64 the callee preserves all general purpose registers, except forRDI and RAX.
    • swiftcc” - This calling convention is used for Swift language.
  • On X86-64 RCX and R8 are available for additional integer returns, andXMM2 and XMM3 are available for additional FP/vector returns.
  • On iOS platforms, we use AAPCS-VFP calling convention.

    • tailcc” - Tail callable calling convention
    • This calling convention ensures that calls in tail position will always betail call optimized. This calling convention is equivalent to fastcc,except for an additional guarantee that tail calls will be producedwhenever possible. Tail calls can only be optimized when this, the fastcc,the GHC or the HiPE convention is used. Thiscalling convention does not support varargs and requires the prototype ofall callees to exactly match the prototype of the function definition.
    • cfguard_checkcc” - Windows Control Flow Guard (Check mechanism)
    • This calling convention is used for the Control Flow Guard check function,calls to which can be inserted before indirect calls to check that the calltarget is a valid function address. The check function has no return value,but it will trigger an OS-level error if the address is not a valid target.The set of registers preserved by the check function, and the registercontaining the target address are architecture-specific.
  • On X86 the target address is passed in ECX.

  • On ARM the target address is passed in R0.
  • On AArch64 the target address is passed in X15.
    • cc <n>” - Numbered convention
    • Any calling convention may be specified by number, allowingtarget-specific calling conventions to be used. Target specificcalling conventions start at 64.

More calling conventions can be added/defined on an as-needed basis, tosupport Pascal conventions or any other well-known target-independentconvention.

Visibility Styles

All Global Variables and Functions have one of the following visibilitystyles:

  • default” - Default style
  • On targets that use the ELF object file format, default visibilitymeans that the declaration is visible to other modules and, inshared libraries, means that the declared entity may be overridden.On Darwin, default visibility means that the declaration is visibleto other modules. Default visibility corresponds to “externallinkage” in the language.
  • hidden” - Hidden style
  • Two declarations of an object with hidden visibility refer to thesame object if they are in the same shared object. Usually, hiddenvisibility indicates that the symbol will not be placed into thedynamic symbol table, so no other module (executable or sharedlibrary) can reference it directly.
  • protected” - Protected style
  • On ELF, protected visibility indicates that the symbol will beplaced in the dynamic symbol table, but that references within thedefining module will bind to the local symbol. That is, the symbolcannot be overridden by another module.

A symbol with internal or private linkage must have defaultvisibility.

DLL Storage Classes

All Global Variables, Functions and Aliases can have one of the followingDLL storage class:

  • dllimport
  • dllimport” causes the compiler to reference a function or variable viaa global pointer to a pointer that is set up by the DLL exporting thesymbol. On Microsoft Windows targets, the pointer name is formed bycombining _imp and the function or variable name.
  • dllexport
  • dllexport” causes the compiler to provide a global pointer to a pointerin a DLL, so that it can be referenced with the dllimport attribute. OnMicrosoft Windows targets, the pointer name is formed by combining_imp and the function or variable name. Since this storage classexists for defining a dll interface, the compiler, assembler and linker knowit is externally referenced and must refrain from deleting the symbol.

Thread Local Storage Models

A variable may be defined as thread_local, which means that it willnot be shared by threads (each thread will have a separated copy of thevariable). Not all targets support thread-local variables. Optionally, aTLS model may be specified:

  • localdynamic
  • For variables that are only used within the current shared library.
  • initialexec
  • For variables in modules that will not be loaded dynamically.
  • localexec
  • For variables defined in the executable and only used within it.

If no explicit model is given, the “general dynamic” model is used.

The models correspond to the ELF TLS models; see ELF Handling ForThread-Local Storage formore information on under which circumstances the different models maybe used. The target may choose a different TLS model if the specifiedmodel is not supported, or if a better choice of model can be made.

A model can also be specified in an alias, but then it only governs howthe alias is accessed. It will not have any effect in the aliasee.

For platforms without linker support of ELF TLS model, the -femulated-tlsflag can be used to generate GCC compatible emulated TLS code.

Runtime Preemption Specifiers

Global variables, functions and aliases may have an optional runtime preemptionspecifier. If a preemption specifier isn’t given explicitly, then asymbol is assumed to be dso_preemptable.

  • dso_preemptable
  • Indicates that the function or variable may be replaced by a symbol fromoutside the linkage unit at runtime.
  • dso_local
  • The compiler may assume that a function or variable marked as dso_localwill resolve to a symbol within the same linkage unit. Direct access willbe generated even if the definition is not within this compilation unit.

Structure Types

LLVM IR allows you to specify both “identified” and “literal” structuretypes. Literal types are uniqued structurally, but identified typesare never uniqued. An opaque structural type can also be usedto forward declare a type that is not yet available.

An example of an identified structure specification is:

  1. %mytype = type { %mytype*, i32 }

Prior to the LLVM 3.0 release, identified types were structurally uniqued. Onlyliteral types are uniqued in recent versions of LLVM.

Non-Integral Pointer Type

Note: non-integral pointer types are a work in progress, and they should beconsidered experimental at this time.

LLVM IR optionally allows the frontend to denote pointers in certain addressspaces as “non-integral” via the datalayout string.Non-integral pointer types represent pointers that have an unspecified bitwiserepresentation; that is, the integral representation may be target dependent orunstable (not backed by a fixed integer).

inttoptr instructions converting integers to non-integral pointer types areill-typed, and so are ptrtoint instructions converting values ofnon-integral pointer types to integers. Vector versions of said instructionsare ill-typed as well.

Global Variables

Global variables define regions of memory allocated at compilation timeinstead of run-time.

Global variable definitions must be initialized.

Global variables in other translation units can also be declared, in whichcase they don’t have an initializer.

Either global variable definitions or declarations may have an explicit sectionto be placed in and may have an optional explicit alignment specified. If thereis a mismatch between the explicit or inferred section information for thevariable declaration and its definition the resulting behavior is undefined.

A variable may be defined as a global constant, which indicates thatthe contents of the variable will never be modified (enabling betteroptimization, allowing the global data to be placed in the read-onlysection of an executable, etc). Note that variables that need runtimeinitialization cannot be marked constant as there is a store to thevariable.

LLVM explicitly allows declarations of global variables to be markedconstant, even if the final definition of the global is not. Thiscapability can be used to enable slightly better optimization of theprogram, but requires the language definition to guarantee thatoptimizations based on the ‘constantness’ are valid for the translationunits that do not include the definition.

As SSA values, global variables define pointer values that are in scope(i.e. they dominate) all basic blocks in the program. Global variablesalways define a pointer to their “content” type because they describe aregion of memory, and all memory objects in LLVM are accessed throughpointers.

Global variables can be marked with unnamedaddr which indicatesthat the address is not significant, only the content. Constants markedlike this can be merged with other constants if they have the sameinitializer. Note that a constant with significant address _can bemerged with a unnamed_addr constant, the result being a constantwhose address is significant.

If the local_unnamed_addr attribute is given, the address is known tonot be significant within the module.

A global variable may be declared to reside in a target-specificnumbered address space. For targets that support them, address spacesmay affect how optimizations are performed and/or what targetinstructions are used to access the variable. The default address spaceis zero. The address space qualifier must precede any other attributes.

LLVM allows an explicit section to be specified for globals. If thetarget supports it, it will emit globals to the section specified.Additionally, the global can placed in a comdat if the target has the necessarysupport.

External declarations may have an explicit section specified. Sectioninformation is retained in LLVM IR for targets that make use of thisinformation. Attaching section information to an external declaration is anassertion that its definition is located in the specified section. If thedefinition is located in a different section, the behavior is undefined.

By default, global initializers are optimized by assuming that globalvariables defined within the module are not modified from theirinitial values before the start of the global initializer. This istrue even for variables potentially accessible from outside themodule, including those with external linkage or appearing in@llvm.used or dllexported variables. This assumption may be suppressedby marking the variable with externally_initialized.

An explicit alignment may be specified for a global, which must be apower of 2. If not present, or if the alignment is set to zero, thealignment of the global is set by the target to whatever it feelsconvenient. If an explicit alignment is specified, the global is forcedto have exactly that alignment. Targets and optimizers are not allowedto over-align the global if the global has an assigned section. In thiscase, the extra alignment could be observable: for example, code couldassume that the globals are densely packed in their section and try toiterate over them as an array, alignment padding would break thisiteration. The maximum alignment is 1 << 29.

Globals can also have a DLL storage class,an optional runtime preemption specifier,an optional global attributes andan optional list of attached metadata.

Variables and aliases can have aThread Local Storage Model.

Scalable vectors cannot be global variables or members ofstructs or arrays because their size is unknown at compile time.

Syntax:

  1. @<GlobalVarName> = [Linkage] [PreemptionSpecifier] [Visibility] [DLLStorageClass] [ThreadLocal] [(unnamed_addr|local_unnamed_addr)] [AddrSpace] [ExternallyInitialized] <global | constant> <Type> [<InitializerConstant>] [, section "name"] [, comdat [($name)]] [, align <Alignment>] (, !name !N)*

For example, the following defines a global in a numbered address spacewith an initializer, section, and alignment:

  1. @G = addrspace(5) constant float 1.0, section "foo", align 4

The following example just declares a global variable

  1. @G = external global i32

The following example defines a thread-local global with theinitialexec TLS model:

  1. @G = thread_local(initialexec) global i32 0, align 4

Functions

LLVM function definitions consist of the “define” keyword, anoptional linkage type, an optional runtime preemptionspecifier, an optional visibilitystyle, an optional DLL storage class,an optional calling convention,an optional unnamed_addr attribute, a return type, an optionalparameter attribute for the return type, a functionname, a (possibly empty) argument list (each with optional parameterattributes), optional function attributes,an optional address space, an optional section, an optional alignment,an optional comdat,an optional garbage collector name, an optional prefix,an optional prologue,an optional personality,an optional list of attached metadata,an opening curly brace, a list of basic blocks, and a closing curly brace.

LLVM function declarations consist of the “declare” keyword, anoptional linkage type, an optional visibility style, an optional DLL storage class, anoptional calling convention, an optional unnamed_addror local_unnamed_addr attribute, an optional address space, a return type,an optional parameter attribute for the return type, a function name, a possiblyempty list of arguments, an optional alignment, an optional garbagecollector name, an optional prefix, and an optionalprologue.

A function definition contains a list of basic blocks, forming the CFG (ControlFlow Graph) for the function. Each basic block may optionally start with a label(giving the basic block a symbol table entry), contains a list of instructions,and ends with a terminator instruction (such as a branch orfunction return). If an explicit label name is not provided, a block is assignedan implicit numbered label, using the next value from the same counter as usedfor unnamed temporaries (see above). For example, if afunction entry block does not have an explicit label, it will be assigned label“%0”, then the first unnamed temporary in that block will be “%1”, etc. If anumeric label is explicitly specified, it must match the numeric label thatwould be used implicitly.

The first basic block in a function is special in two ways: it isimmediately executed on entrance to the function, and it is not allowedto have predecessor basic blocks (i.e. there can not be any branches tothe entry block of a function). Because the block can have nopredecessors, it also cannot have any PHI nodes.

LLVM allows an explicit section to be specified for functions. If thetarget supports it, it will emit functions to the section specified.Additionally, the function can be placed in a COMDAT.

An explicit alignment may be specified for a function. If not present,or if the alignment is set to zero, the alignment of the function is setby the target to whatever it feels convenient. If an explicit alignmentis specified, the function is forced to have at least that muchalignment. All alignments must be a power of 2.

If the unnamed_addr attribute is given, the address is known to notbe significant and two identical functions can be merged.

If the local_unnamed_addr attribute is given, the address is known tonot be significant within the module.

If an explicit address space is not given, it will default to the programaddress space from the datalayout string.

Syntax:

  1. define [linkage] [PreemptionSpecifier] [visibility] [DLLStorageClass]
  2. [cconv] [ret attrs]
  3. <ResultType> @<FunctionName> ([argument list])
  4. [(unnamed_addr|local_unnamed_addr)] [AddrSpace] [fn Attrs]
  5. [section "name"] [comdat [($name)]] [align N] [gc] [prefix Constant]
  6. [prologue Constant] [personality Constant] (!name !N)* { ... }

The argument list is a comma separated sequence of arguments where eachargument is of the following form:

Syntax:

  1. <type> [parameter Attrs] [name]

Aliases

Aliases, unlike function or variables, don’t create any new data. Theyare just a new symbol and metadata for an existing position.

Aliases have a name and an aliasee that is either a global value or aconstant expression.

Aliases may have an optional linkage type, an optionalruntime preemption specifier, an optionalvisibility style, an optional DLL storage class and an optional tls model.

Syntax:

  1. @<Name> = [Linkage] [PreemptionSpecifier] [Visibility] [DLLStorageClass] [ThreadLocal] [(unnamed_addr|local_unnamed_addr)] alias <AliaseeTy>, <AliaseeTy>* @<Aliasee>

The linkage must be one of private, internal, linkonce, weak,linkonce_odr, weak_odr, external. Note that some system linkersmight not correctly handle dropping a weak symbol that is aliased.

Aliases that are not unnamed_addr are guaranteed to have the same address asthe aliasee expression. unnamed_addr ones are only guaranteed to pointto the same content.

If the local_unnamed_addr attribute is given, the address is known tonot be significant within the module.

Since aliases are only a second name, some restrictions apply, of whichsome can only be checked when producing an object file:

  • The expression defining the aliasee must be computable at assemblytime. Since it is just a name, no relocations can be used.
  • No alias in the expression can be weak as the possibility of theintermediate alias being overridden cannot be represented in anobject file.
  • No global value in the expression can be a declaration, since thatwould require a relocation, which is not possible.

IFuncs

IFuncs, like as aliases, don’t create any new data or func. They are just a newsymbol that dynamic linker resolves at runtime by calling a resolver function.

IFuncs have a name and a resolver that is a function called by dynamic linkerthat returns address of another function associated with the name.

IFunc may have an optional linkage type and an optionalvisibility style.

Syntax:

  1. @<Name> = [Linkage] [Visibility] ifunc <IFuncTy>, <ResolverTy>* @<Resolver>

Comdats

Comdat IR provides access to COFF and ELF object file COMDAT functionality.

Comdats have a name which represents the COMDAT key. All global objects thatspecify this key will only end up in the final object file if the linker choosesthat key over some other key. Aliases are placed in the same COMDAT that theiraliasee computes to, if any.

Comdats have a selection kind to provide input on how the linker shouldchoose between keys in two different object files.

Syntax:

  1. $<Name> = comdat SelectionKind

The selection kind must be one of the following:

  • any
  • The linker may choose any COMDAT key, the choice is arbitrary.
  • exactmatch
  • The linker may choose any COMDAT key but the sections must contain thesame data.
  • largest
  • The linker will choose the section containing the largest COMDAT key.
  • noduplicates
  • The linker requires that only section with this COMDAT key exist.
  • samesize
  • The linker may choose any COMDAT key but the sections must contain thesame amount of data.

Note that XCOFF and the Mach-O platform don’t support COMDATs, and ELF andWebAssembly only support any as a selection kind.

Here is an example of a COMDAT group where a function will only be selected ifthe COMDAT key’s section is the largest:

  1. $foo = comdat largest
  2. @foo = global i32 2, comdat($foo)
  3.  
  4. define void @bar() comdat($foo) {
  5. ret void
  6. }

As a syntactic sugar the $name can be omitted if the name is the same asthe global name:

  1. $foo = comdat any
  2. @foo = global i32 2, comdat

In a COFF object file, this will create a COMDAT section with selection kindIMAGE_COMDAT_SELECT_LARGEST containing the contents of the @foo symboland another COMDAT section with selection kindIMAGE_COMDAT_SELECT_ASSOCIATIVE which is associated with the first COMDATsection and contains the contents of the @bar symbol.

There are some restrictions on the properties of the global object.It, or an alias to it, must have the same name as the COMDAT group whentargeting COFF.The contents and size of this object may be used during link-time to determinewhich COMDAT groups get selected depending on the selection kind.Because the name of the object must match the name of the COMDAT group, thelinkage of the global object must not be local; local symbols can get renamedif a collision occurs in the symbol table.

The combined use of COMDATS and section attributes may yield surprising results.For example:

  1. $foo = comdat any
  2. $bar = comdat any
  3. @g1 = global i32 42, section "sec", comdat($foo)
  4. @g2 = global i32 42, section "sec", comdat($bar)

From the object file perspective, this requires the creation of two sectionswith the same name. This is necessary because both globals belong to differentCOMDAT groups and COMDATs, at the object file level, are represented bysections.

Note that certain IR constructs like global variables and functions maycreate COMDATs in the object file in addition to any which are specified usingCOMDAT IR. This arises when the code generator is configured to emit globalsin individual sections (e.g. when -data-sections or -function-sections_is supplied to _llc).

Named Metadata

Named metadata is a collection of metadata. Metadatanodes (but not metadata strings) are the only validoperands for a named metadata.

  • Named metadata are represented as a string of characters with themetadata prefix. The rules for metadata names are the same as foridentifiers, but quoted names are not allowed. "\xx" type escapesare still valid, which allows any character to be part of a name.Syntax:
  1. ; Some unnamed metadata nodes, which are referenced by the named metadata.
  2. !0 = !{!"zero"}
  3. !1 = !{!"one"}
  4. !2 = !{!"two"}
  5. ; A named metadata.
  6. !name = !{!0, !1, !2}

Parameter Attributes

The return type and each parameter of a function type may have a set ofparameter attributes associated with them. Parameter attributes areused to communicate additional information about the result orparameters of a function. Parameter attributes are considered to be partof the function, not of the function type, so functions with differentparameter attributes can have the same function type.

Parameter attributes are simple keywords that follow the type specified.If multiple parameter attributes are needed, they are space separated.For example:

  1. declare i32 @printf(i8* noalias nocapture, ...)
  2. declare i32 @atoi(i8 zeroext)
  3. declare signext i8 @returns_signed_char()

Note that any attributes for the function result (nounwind,readonly) come immediately after the argument list.

Currently, only the following parameter attributes are defined:

  • zeroext
  • This indicates to the code generator that the parameter or returnvalue should be zero-extended to the extent required by the target’sABI by the caller (for a parameter) or the callee (for a return value).
  • signext
  • This indicates to the code generator that the parameter or returnvalue should be sign-extended to the extent required by the target’sABI (which is usually 32-bits) by the caller (for a parameter) orthe callee (for a return value).
  • inreg
  • This indicates that this parameter or return value should be treatedin a special target-dependent fashion while emitting code fora function call or return (usually, by putting it in a register asopposed to memory, though some targets use it to distinguish betweentwo different kinds of registers). Use of this attribute istarget-specific.
  • byval or byval(<ty>)
  • This indicates that the pointer parameter should really be passed byvalue to the function. The attribute implies that a hidden copy ofthe pointee is made between the caller and the callee, so the calleeis unable to modify the value in the caller. This attribute is onlyvalid on LLVM pointer arguments. It is generally used to passstructs and arrays by value, but is also valid on pointers toscalars. The copy is considered to belong to the caller not thecallee (for example, readonly functions should not write tobyval parameters). This is not a valid attribute for returnvalues.

The byval attribute also supports an optional type argument, which must bethe same as the pointee type of the argument.

The byval attribute also supports specifying an alignment with thealign attribute. It indicates the alignment of the stack slot toform and the known alignment of the pointer specified to the callsite. If the alignment is not specified, then the code generatormakes a target-specific assumption.

inalloca

The inalloca argument attribute allows the caller to take theaddress of outgoing stack arguments. An inalloca argument mustbe a pointer to stack memory produced by an alloca instruction.The alloca, or argument allocation, must also be tagged with theinalloca keyword. Only the last argument may have the inallocaattribute, and that argument is guaranteed to be passed in memory.

An argument allocation may be used by a call at most once becausethe call may deallocate it. The inalloca attribute cannot beused in conjunction with other attributes that affect argumentstorage, like inreg, nest, sret, or byval. Theinalloca attribute also disables LLVM’s implicit lowering oflarge aggregate return values, which means that frontend authorsmust lower them with sret pointers.

When the call site is reached, the argument allocation must havebeen the most recent stack allocation that is still live, or thebehavior is undefined. It is possible to allocate additional stackspace after an argument allocation and before its call site, but itmust be cleared off with llvm.stackrestore.

See Design and Usage of the InAlloca Attribute for more information on how to use thisattribute.

  • sret
  • This indicates that the pointer parameter specifies the address of astructure that is the return value of the function in the sourceprogram. This pointer must be guaranteed by the caller to be valid:loads and stores to the structure may be assumed by the callee notto trap and to be properly aligned. This is not a valid attributefor return values.
  • align <n>
  • This indicates that the pointer value may be assumed by the optimizer tohave the specified alignment. If the pointer value does not have thespecified alignment, behavior is undefined.

Note that this attribute has additional semantics when combined with thebyval attribute, which are documented there.

  • noalias
  • This indicates that objects accessed via pointer valuesbased on the argument or return value are not alsoaccessed, during the execution of the function, via pointer values notbased on the argument or return value. The attribute on a return valuealso has additional semantics described below. The caller shares theresponsibility with the callee for ensuring that these requirements are met.For further details, please see the discussion of the NoAlias response inalias analysis.

Note that this definition of noalias is intentionally similarto the definition of restrict in C99 for function arguments.

For function return values, C99’s restrict is not meaningful,while LLVM’s noalias is. Furthermore, the semantics of the noaliasattribute on return values are stronger than the semantics of the attributewhen used on function arguments. On function return values, the noaliasattribute indicates that the function acts like a system memory allocationfunction, returning a pointer to allocated storage disjoint from thestorage for any other object accessible to the caller.

  • nocapture
  • This indicates that the callee does not make any copies of thepointer that outlive the callee itself. This is not a validattribute for return values. Addresses used in volatile operationsare considered to be captured.
  • nofree
  • This indicates that callee does not free the pointer argument. This is nota valid attribute for return values.
  • nest
  • This indicates that the pointer parameter can be excised using thetrampoline intrinsics. This is not a validattribute for return values and can only be applied to one parameter.
  • returned
  • This indicates that the function always returns the argument as its returnvalue. This is a hint to the optimizer and code generator used whengenerating the caller, allowing value propagation, tail call optimization,and omission of register saves and restores in some cases; it is notchecked or enforced when generating the callee. The parameter and thefunction return type must be valid operands for thebitcast instruction. This is not a valid attribute forreturn values and can only be applied to one parameter.
  • nonnull
  • This indicates that the parameter or return pointer is not null. Thisattribute may only be applied to pointer typed parameters. This is notchecked or enforced by LLVM; if the parameter or return pointer is null,the behavior is undefined.
  • dereferenceable(<n>)
  • This indicates that the parameter or return pointer is dereferenceable. Thisattribute may only be applied to pointer typed parameters. A pointer thatis dereferenceable can be loaded from speculatively without a risk oftrapping. The number of bytes known to be dereferenceable must be providedin parentheses. It is legal for the number of bytes to be less than thesize of the pointee type. The nonnull attribute does not implydereferenceability (consider a pointer to one element past the end of anarray), however dereferenceable(<n>) does imply nonnull inaddrspace(0) (which is the default address space).
  • dereferenceable_or_null(<n>)
  • This indicates that the parameter or return value isn’t bothnon-null and non-dereferenceable (up to <n> bytes) at the sametime. All non-null pointers tagged withdereferenceable_or_null(<n>) are dereferenceable(<n>).For address space 0 dereferenceable_or_null(<n>) implies thata pointer is exactly one of dereferenceable(<n>) or null,and in other address spaces dereferenceable_or_null(<n>)implies that a pointer is at least one of dereferenceable(<n>)or null (i.e. it may be both null anddereferenceable(<n>)). This attribute may only be applied topointer typed parameters.
  • swiftself
  • This indicates that the parameter is the self/context parameter. This is nota valid attribute for return values and can only be applied to oneparameter.
  • swifterror
  • This attribute is motivated to model and optimize Swift error handling. Itcan be applied to a parameter with pointer to pointer type or apointer-sized alloca. At the call site, the actual argument that correspondsto a swifterror parameter has to come from a swifterror alloca orthe swifterror parameter of the caller. A swifterror value (eitherthe parameter or the alloca) can only be loaded and stored from, or used asa swifterror argument. This is not a valid attribute for return valuesand can only be applied to one parameter.

These constraints allow the calling convention to optimize access toswifterror variables by associating them with a specific register atcall boundaries rather than placing them in memory. Since this does changethe calling convention, a function which uses the swifterror attributeon a parameter is not ABI-compatible with one which does not.

These constraints also allow LLVM to assume that a swifterror argumentdoes not alias any other memory visible within a function and that aswifterror alloca passed as an argument does not escape.

  • immarg
  • This indicates the parameter is required to be an immediatevalue. This must be a trivial immediate integer or floating-pointconstant. Undef or constant expressions are not valid. This isonly valid on intrinsic declarations and cannot be applied to acall site or arbitrary function.

Garbage Collector Strategy Names

Each function may specify a garbage collector strategy name, which is simply astring:

  1. define void @f() gc "name" { ... }

The supported values of name includes those built in to LLVM and any provided by loaded plugins. Specifying a GCstrategy will cause the compiler to alter its output in order to support thenamed garbage collection algorithm. Note that LLVM itself does not contain agarbage collector, this functionality is restricted to generating machine codewhich can interoperate with a collector provided externally.

Prefix Data

Prefix data is data associated with a function which the codegenerator will emit immediately before the function’s entrypoint.The purpose of this feature is to allow frontends to associatelanguage-specific runtime metadata with specific functions and make itavailable through the function pointer while still allowing thefunction pointer to be called.

To access the data for a given function, a program may bitcast thefunction pointer to a pointer to the constant’s type and dereferenceindex -1. This implies that the IR symbol points just past the end ofthe prefix data. For instance, take the example of a function annotatedwith a single i32,

  1. define void @f() prefix i32 123 { ... }

The prefix data can be referenced as,

  1. %0 = bitcast void* () @f to i32*
  2. %a = getelementptr inbounds i32, i32* %0, i32 -1
  3. %b = load i32, i32* %a

Prefix data is laid out as if it were an initializer for a global variableof the prefix data’s type. The function will be placed such that thebeginning of the prefix data is aligned. This means that if the sizeof the prefix data is not a multiple of the alignment size, thefunction’s entrypoint will not be aligned. If alignment of thefunction’s entrypoint is desired, padding must be added to the prefixdata.

A function may have prefix data but no body. This has similar semanticsto the available_externally linkage in that the data may be used by theoptimizers but will not be emitted in the object file.

Prologue Data

The prologue attribute allows arbitrary code (encoded as bytes) tobe inserted prior to the function body. This can be used for enablingfunction hot-patching and instrumentation.

To maintain the semantics of ordinary function calls, the prologue data musthave a particular format. Specifically, it must begin with a sequence ofbytes which decode to a sequence of machine instructions, valid for themodule’s target, which transfer control to the point immediately succeedingthe prologue data, without performing any other visible action. This allowsthe inliner and other passes to reason about the semantics of the functiondefinition without needing to reason about the prologue data. Obviously thismakes the format of the prologue data highly target dependent.

A trivial example of valid prologue data for the x86 architecture is i8 144,which encodes the nop instruction:

  1. define void @f() prologue i8 144 { ... }

Generally prologue data can be formed by encoding a relative branch instructionwhich skips the metadata, as in this example of valid prologue data for thex86_64 architecture, where the first two bytes encode jmp .+10:

  1. %0 = type <{ i8, i8, i8* }>
  2.  
  3. define void @f() prologue %0 <{ i8 235, i8 8, i8* @md}> { ... }

A function may have prologue data but no body. This has similar semanticsto the available_externally linkage in that the data may be used by theoptimizers but will not be emitted in the object file.

Personality Function

The personality attribute permits functions to specify what functionto use for exception handling.

Attribute Groups

Attribute groups are groups of attributes that are referenced by objects withinthe IR. They are important for keeping .ll files readable, because a lot offunctions will use the same set of attributes. In the degenerative case of a.ll file that corresponds to a single .c file, the single attributegroup will capture the important command line flags used to build that file.

An attribute group is a module-level object. To use an attribute group, anobject references the attribute group’s ID (e.g. #37). An object may referto more than one attribute group. In that situation, the attributes from thedifferent groups are merged.

Here is an example of attribute groups for a function that should always beinlined, has a stack alignment of 4, and which shouldn’t use SSE instructions:

  1. ; Target-independent attributes:
  2. attributes #0 = { alwaysinline alignstack=4 }
  3.  
  4. ; Target-dependent attributes:
  5. attributes #1 = { "no-sse" }
  6.  
  7. ; Function @f has attributes: alwaysinline, alignstack=4, and "no-sse".
  8. define void @f() #0 #1 { ... }

Function Attributes

Function attributes are set to communicate additional information abouta function. Function attributes are considered to be part of thefunction, not of the function type, so functions with different functionattributes can have the same function type.

Function attributes are simple keywords that follow the type specified.If multiple attributes are needed, they are space separated. Forexample:

  1. define void @f() noinline { ... }
  2. define void @f() alwaysinline { ... }
  3. define void @f() alwaysinline optsize { ... }
  4. define void @f() optsize { ... }
  • alignstack(<n>)
  • This attribute indicates that, when emitting the prologue andepilogue, the backend should forcibly align the stack pointer.Specify the desired alignment, which must be a power of two, inparentheses.
  • allocsize(<EltSizeParam>[, <NumEltsParam>])
  • This attribute indicates that the annotated function will always return atleast a given number of bytes (or null). Its arguments are zero-indexedparameter numbers; if one argument is provided, then it’s assumed that atleast CallSite.Args[EltSizeParam] bytes will be available at thereturned pointer. If two are provided, then it’s assumed thatCallSite.Args[EltSizeParam] * CallSite.Args[NumEltsParam] bytes areavailable. The referenced parameters must be integer types. No assumptionsare made about the contents of the returned block of memory.
  • alwaysinline
  • This attribute indicates that the inliner should attempt to inlinethis function into callers whenever possible, ignoring any activeinlining size threshold for this caller.
  • builtin
  • This indicates that the callee function at a call site should berecognized as a built-in function, even though the function’s declarationuses the nobuiltin attribute. This is only valid at call sites fordirect calls to functions that are declared with the nobuiltinattribute.
  • cold
  • This attribute indicates that this function is rarely called. Whencomputing edge weights, basic blocks post-dominated by a coldfunction call are also considered to be cold; and, thus, given lowweight.
  • convergent
  • In some parallel execution models, there exist operations that cannot bemade control-dependent on any additional values. We call such operationsconvergent, and mark them with this attribute.

The convergent attribute may appear on functions or call/invokeinstructions. When it appears on a function, it indicates that calls tothis function should not be made control-dependent on additional values.For example, the intrinsic llvm.nvvm.barrier0 is convergent, socalls to this intrinsic cannot be made control-dependent on additionalvalues.

When it appears on a call/invoke, the convergent attribute indicatesthat we should treat the call as though we’re calling a convergentfunction. This is particularly useful on indirect calls; without this wemay treat such calls as though the target is non-convergent.

The optimizer may remove the convergent attribute on functions when itcan prove that the function does not execute any convergent operations.Similarly, the optimizer may remove convergent on calls/invokes when itcan prove that the call/invoke cannot call a convergent function.

  • inaccessiblememonly
  • This attribute indicates that the function may only access memory thatis not accessible by the module being compiled. This is a weaker formof readnone. If the function reads or writes other memory, thebehavior is undefined.
  • inaccessiblemem_or_argmemonly
  • This attribute indicates that the function may only access memory that iseither not accessible by the module being compiled, or is pointed toby its pointer arguments. This is a weaker form of argmemonly. If thefunction reads or writes other memory, the behavior is undefined.
  • inlinehint
  • This attribute indicates that the source code contained a hint thatinlining this function is desirable (such as the “inline” keyword inC/C++). It is just a hint; it imposes no requirements on theinliner.
  • jumptable
  • This attribute indicates that the function should be added to ajump-instruction table at code-generation time, and that all address-takenreferences to this function should be replaced with a reference to theappropriate jump-instruction-table function pointer. Note that this createsa new pointer for the original function, which means that code that dependson function-pointer identity can break. So, any function annotated withjumptable must also be unnamed_addr.
  • minsize
  • This attribute suggests that optimization passes and code generatorpasses make choices that keep the code size of this function as smallas possible and perform optimizations that may sacrifice runtimeperformance in order to minimize the size of the generated code.
  • naked
  • This attribute disables prologue / epilogue emission for thefunction. This can have very system-specific consequences.
  • "no-inline-line-tables"
  • When this attribute is set to true, the inliner discards source locationswhen inlining code and instead uses the source location of the call site.Breakpoints set on code that was inlined into the current function willnot fire during the execution of the inlined call sites. If the debuggerstops inside an inlined call site, it will appear to be stopped at theoutermost inlined call site.
  • no-jump-tables
  • When this attribute is set to true, the jump tables and lookup tables thatcan be generated from a switch case lowering are disabled.
  • nobuiltin
  • This indicates that the callee function at a call site is not recognized asa built-in function. LLVM will retain the original call and not replace itwith equivalent code based on the semantics of the built-in function, unlessthe call site uses the builtin attribute. This is valid at call sitesand on function declarations and definitions.
  • noduplicate
  • This attribute indicates that calls to the function cannot beduplicated. A call to a noduplicate function may be movedwithin its parent function, but may not be duplicated withinits parent function.

A function containing a noduplicate call may stillbe an inlining candidate, provided that the call is notduplicated by inlining. That implies that the function hasinternal linkage and only has one call site, so the originalcall is dead after inlining.

  • nofree
  • This function attribute indicates that the function does not, directly orindirectly, call a memory-deallocation function (free, for example). As aresult, uncaptured pointers that are known to be dereferenceable prior to acall to a function with the nofree attribute are still known to bedereferenceable after the call (the capturing condition is necessary inenvironments where the function might communicate the pointer to another threadwhich then deallocates the memory).
  • noimplicitfloat
  • This attributes disables implicit floating-point instructions.
  • noinline
  • This attribute indicates that the inliner should never inline thisfunction in any situation. This attribute may not be used togetherwith the alwaysinline attribute.
  • nonlazybind
  • This attribute suppresses lazy symbol binding for the function. Thismay make calls to the function faster, at the cost of extra programstartup time if the function is not called during program startup.
  • noredzone
  • This attribute indicates that the code generator should not use ared zone, even if the target-specific ABI normally permits it.
  • indirect-tls-seg-refs
  • This attribute indicates that the code generator should not usedirect TLS access through segment registers, even if thetarget-specific ABI normally permits it.
  • noreturn
  • This function attribute indicates that the function never returnsnormally, hence through a return instruction. This produces undefinedbehavior at runtime if the function ever does dynamically return. Annotatedfunctions may still raise an exception, i.a., nounwind is not implied.
  • norecurse
  • This function attribute indicates that the function does not call itselfeither directly or indirectly down any possible call path. This producesundefined behavior at runtime if the function ever does recurse.
  • willreturn
  • This function attribute indicates that a call of this function willeither exhibit undefined behavior or comes back and continues executionat a point in the existing call stack that includes the current invocation.Annotated functions may still raise an exception, i.a., nounwind is not implied.If an invocation of an annotated function does not return control backto a point in the call stack, the behavior is undefined.
  • nosync
  • This function attribute indicates that the function does not communicate(synchronize) with another thread through memory or other well-defined means.Synchronization is considered possible in the presence of atomic accessesthat enforce an order, thus not “unordered” and “monotonic”, volatile accesses,as well as convergent function calls. Note that through convergent function callsnon-memory communication, e.g., cross-lane operations, are possible and are alsoconsidered synchronization. However convergent does not contradict nosync.If an annotated function does ever synchronize with another thread,the behavior is undefined.
  • nounwind
  • This function attribute indicates that the function never raises anexception. If the function does raise an exception, its runtimebehavior is undefined. However, functions marked nounwind may stilltrap or generate asynchronous exceptions. Exception handling schemesthat are recognized by LLVM to handle asynchronous exceptions, suchas SEH, will still provide their implementation defined semantics.
  • "null-pointer-is-valid"
  • If "null-pointer-is-valid" is set to "true", then null addressin address-space 0 is considered to be a valid address for memory loads andstores. Any analysis or optimization should not treat dereferencing apointer to null as undefined behavior in this function.Note: Comparing address of a global variable to null may stillevaluate to false because of a limitation in querying this attribute insideconstant expressions.
  • optforfuzzing
  • This attribute indicates that this function should be optimizedfor maximum fuzzing signal.
  • optnone
  • This function attribute indicates that most optimization passes will skipthis function, with the exception of interprocedural optimization passes.Code generation defaults to the “fast” instruction selector.This attribute cannot be used together with the alwaysinlineattribute; this attribute is also incompatiblewith the minsize attribute and the optsize attribute.

This attribute requires the noinline attribute to be specified onthe function as well, so the function is never inlined into any caller.Only functions with the alwaysinline attribute are validcandidates for inlining into the body of this function.

  • optsize
  • This attribute suggests that optimization passes and code generatorpasses make choices that keep the code size of this function low,and otherwise do optimizations specifically to reduce code size aslong as they do not significantly impact runtime performance.
  • "patchable-function"
  • This attribute tells the code generator that the codegenerated for this function needs to follow certain conventions thatmake it possible for a runtime function to patch over it later.The exact effect of this attribute depends on its string value,for which there currently is one legal possibility:
  • "prologue-short-redirect" - This style of patchablefunction is intended to support patching a function prologue toredirect control away from the function in a thread safemanner. It guarantees that the first instruction of thefunction will be large enough to accommodate a short jumpinstruction, and will be sufficiently aligned to allow beingfully changed via an atomic compare-and-swap instruction.While the first requirement can be satisfied by inserting largeenough NOP, LLVM can and will try to re-purpose an existinginstruction (i.e. one that would have to be emitted anyway) asthe patchable instruction larger than a short jump.

    "prologue-short-redirect" is currently only supported onx86-64.

This attribute by itself does not imply restrictions oninter-procedural optimizations. All of the semantic effects thepatching may have to be separately conveyed via the linkage type.

  • "probe-stack"
  • This attribute indicates that the function will trigger a guard regionin the end of the stack. It ensures that accesses to the stack must beno further apart than the size of the guard region to a previousaccess of the stack. It takes one required string value, the name ofthe stack probing function that will be called.

If a function that has a "probe-stack" attribute is inlined intoa function with another "probe-stack" attribute, the resultingfunction has the "probe-stack" attribute of the caller. If afunction that has a "probe-stack" attribute is inlined into afunction that has no "probe-stack" attribute at all, the resultingfunction has the "probe-stack" attribute of the callee.

  • readnone
  • On a function, this attribute indicates that the function computes itsresult (or decides to unwind an exception) based strictly on its arguments,without dereferencing any pointer arguments or otherwise accessingany mutable state (e.g. memory, control registers, etc) visible tocaller functions. It does not write through any pointer arguments(including byval arguments) and never changes any state visibleto callers. This means while it cannot unwind exceptions by callingthe C++ exception throwing methods (since they write to memory), there maybe non-C++ mechanisms that throw exceptions without writing to LLVMvisible memory.

On an argument, this attribute indicates that the function does notdereference that pointer argument, even though it may read or write thememory that the pointer points to if accessed through other pointers.

If a readnone function reads or writes memory visible to the program, orhas other side-effects, the behavior is undefined. If a function reads fromor writes to a readnone pointer argument, the behavior is undefined.

  • readonly
  • On a function, this attribute indicates that the function does not writethrough any pointer arguments (including byval arguments) or otherwisemodify any state (e.g. memory, control registers, etc) visible tocaller functions. It may dereference pointer arguments and readstate that may be set in the caller. A readonly function alwaysreturns the same value (or unwinds an exception identically) whencalled with the same set of arguments and global state. This means while itcannot unwind exceptions by calling the C++ exception throwing methods(since they write to memory), there may be non-C++ mechanisms that throwexceptions without writing to LLVM visible memory.

On an argument, this attribute indicates that the function does not writethrough this pointer argument, even though it may write to the memory thatthe pointer points to.

If a readonly function writes memory visible to the program, orhas other side-effects, the behavior is undefined. If a function writes toa readonly pointer argument, the behavior is undefined.

  • "stack-probe-size"
  • This attribute controls the behavior of stack probes: eitherthe "probe-stack" attribute, or ABI-required stack probes, if any.It defines the size of the guard region. It ensures that if the functionmay use more stack space than the size of the guard region, stack probingsequence will be emitted. It takes one required integer value, whichis 4096 by default.

If a function that has a "stack-probe-size" attribute is inlined intoa function with another "stack-probe-size" attribute, the resultingfunction has the "stack-probe-size" attribute that has the lowernumeric value. If a function that has a "stack-probe-size" attribute isinlined into a function that has no "stack-probe-size" attributeat all, the resulting function has the "stack-probe-size" attributeof the callee.

  • "no-stack-arg-probe"
  • This attribute disables ABI-required stack probes, if any.
  • writeonly
  • On a function, this attribute indicates that the function may write to butdoes not read from memory.

On an argument, this attribute indicates that the function may write to butdoes not read through this pointer argument (even though it may read fromthe memory that the pointer points to).

If a writeonly function reads memory visible to the program, orhas other side-effects, the behavior is undefined. If a function readsfrom a writeonly pointer argument, the behavior is undefined.

  • argmemonly
  • This attribute indicates that the only memory accesses inside function areloads and stores from objects pointed to by its pointer-typed arguments,with arbitrary offsets. Or in other words, all memory operations in thefunction can refer to memory only using pointers based on its functionarguments.

Note that argmemonly can be used together with readonly attributein order to specify that function reads only from its arguments.

If an argmemonly function reads or writes memory other than the pointerarguments, or has other side-effects, the behavior is undefined.

  • returns_twice
  • This attribute indicates that this function can return twice. The Csetjmp is an example of such a function. The compiler disablessome optimizations (like tail calls) in the caller of thesefunctions.
  • safestack
  • This attribute indicates thatSafeStackprotection is enabled for this function.

If a function that has a safestack attribute is inlined into afunction that doesn’t have a safestack attribute or which has anssp, sspstrong or sspreq attribute, then the resultingfunction will have a safestack attribute.

  • sanitize_address
  • This attribute indicates that AddressSanitizer checks(dynamic address safety analysis) are enabled for this function.
  • sanitize_memory
  • This attribute indicates that MemorySanitizer checks (dynamic detectionof accesses to uninitialized memory) are enabled for this function.
  • sanitize_thread
  • This attribute indicates that ThreadSanitizer checks(dynamic thread safety analysis) are enabled for this function.
  • sanitize_hwaddress
  • This attribute indicates that HWAddressSanitizer checks(dynamic address safety analysis based on tagged pointers) are enabled forthis function.
  • sanitize_memtag
  • This attribute indicates that MemTagSanitizer checks(dynamic address safety analysis based on Armv8 MTE) are enabled forthis function.
  • speculative_load_hardening
  • This attribute indicates thatSpeculative Load Hardeningshould be enabled for the function body.

Speculative Load Hardening is a best-effort mitigation againstinformation leak attacks that make use of control flowmiss-speculation - specifically miss-speculation of whether a branchis taken or not. Typically vulnerabilities enabling such attacks areclassified as “Spectre variant #1”. Notably, this does not attempt tomitigate against miss-speculation of branch target, classified as“Spectre variant #2” vulnerabilities.

When inlining, the attribute is sticky. Inlining a function that carriesthis attribute will cause the caller to gain the attribute. This is intendedto provide a maximally conservative model where the code in a functionannotated with this attribute will always (even after inlining) end uphardened.

  • speculatable
  • This function attribute indicates that the function does not have anyeffects besides calculating its result and does not have undefined behavior.Note that speculatable is not enough to conclude that along anyparticular execution path the number of calls to this function will not beexternally observable. This attribute is only valid on functionsand declarations, not on individual call sites. If a function isincorrectly marked as speculatable and really does exhibitundefined behavior, the undefined behavior may be observed evenif the call site is dead code.
  • ssp
  • This attribute indicates that the function should emit a stacksmashing protector. It is in the form of a “canary” — a random valueplaced on the stack before the local variables that’s checked uponreturn from the function to see if it has been overwritten. Aheuristic is used to determine if a function needs stack protectorsor not. The heuristic used will enable protectors for functions with:

    • Character arrays larger than ssp-buffer-size (default 8).
    • Aggregates containing character arrays larger than ssp-buffer-size.
    • Calls to alloca() with variable sizes or constant sizes greater thanssp-buffer-size.Variables that are identified as requiring a protector will be arrangedon the stack such that they are adjacent to the stack protector guard.

If a function that has an ssp attribute is inlined into afunction that doesn’t have an ssp attribute, then the resultingfunction will have an ssp attribute.

  • sspreq
  • This attribute indicates that the function should always emit astack smashing protector. This overrides the ssp functionattribute.

Variables that are identified as requiring a protector will be arrangedon the stack such that they are adjacent to the stack protector guard.The specific layout rules are:

  • Large arrays and structures containing large arrays(>= ssp-buffer-size) are closest to the stack protector.
  • Small arrays and structures containing small arrays(< ssp-buffer-size) are 2nd closest to the protector.
  • Variables that have had their address taken are 3rd closest to theprotector.If a function that has an sspreq attribute is inlined into afunction that doesn’t have an sspreq attribute or which has anssp or sspstrong attribute, then the resulting function will havean sspreq attribute.
  • sspstrong
  • This attribute indicates that the function should emit a stack smashingprotector. This attribute causes a strong heuristic to be used whendetermining if a function needs stack protectors. The strong heuristicwill enable protectors for functions with:

    • Arrays of any size and type
    • Aggregates containing an array of any size and type.
    • Calls to alloca().
    • Local variables that have had their address taken.Variables that are identified as requiring a protector will be arrangedon the stack such that they are adjacent to the stack protector guard.The specific layout rules are:

    • Large arrays and structures containing large arrays(>= ssp-buffer-size) are closest to the stack protector.

    • Small arrays and structures containing small arrays(< ssp-buffer-size) are 2nd closest to the protector.
    • Variables that have had their address taken are 3rd closest to theprotector.This overrides the ssp function attribute.

If a function that has an sspstrong attribute is inlined into afunction that doesn’t have an sspstrong attribute, then theresulting function will have an sspstrong attribute.

  • strictfp
  • This attribute indicates that the function was called from a scope thatrequires strict floating-point semantics. LLVM will not attempt anyoptimizations that require assumptions about the floating-point roundingmode or that might alter the state of floating-point status flags thatmight otherwise be set or cleared by calling this function. LLVM willnot introduce any new floating-point instructions that may trap.
  • "denormal-fp-math"

This indicates the denormal (subnormal) handling that may beassumed for the default floating-point environment. This is acomma separated pair. The elements may be one of "ieee","preserve-sign", or "positive-zero". The first entryindicates the flushing mode for the result of floating pointoperations. The second indicates the handling of denormal inputsto floating point instructions. For compatability with olderbitcode, if the second value is omitted, both input and outputmodes will assume the same mode.

If this is attribute is not specified, the default is"ieee,ieee".

If the output mode is "preserve-sign", or "positive-zero",denormal outputs may be flushed to zero by standard floating-pointoperations. It is not mandated that flushing to zero occurs, but ifa denormal output is flushed to zero, it must respect the signmode. Not all targets support all modes. While this indicates theexpected floating point mode the function will be executed with,this does not make any attempt to ensure the mode isconsistent. User or platform code is expected to set the floatingpoint mode appropriately before function entry.

If the input mode is "preserve-sign", or "positive-zero", afloating-point operation must treat any input denormal value aszero. In some situations, if an instruction does not respect thismode, the input may need to be converted to 0 as if by@llvm.canonicalize during lowering for correctness.

  • "denormal-fp-math-f32"
  • Same as "denormal-fp-math", but only controls the behavior ofthe 32-bit float type (or vectors of 32-bit floats). If both areare present, this overrides "denormal-fp-math". Not all targetssupport separately setting the denormal mode per type, and noattempt is made to diagnose unsupported uses. Currently thisattribute is respected by the AMDGPU and NVPTX backends.
  • "thunk"
  • This attribute indicates that the function will delegate to some otherfunction with a tail call. The prototype of a thunk should not be used foroptimization purposes. The caller is expected to cast the thunk prototype tomatch the thunk target prototype.
  • uwtable
  • This attribute indicates that the ABI being targeted requires thatan unwind table entry be produced for this function even if we canshow that no exceptions passes by it. This is normally the case forthe ELF x86-64 abi, but it can be disabled for some compilationunits.
  • nocf_check
  • This attribute indicates that no control-flow check will be performed onthe attributed entity. It disables -fcf-protection=<> for a specificentity to fine grain the HW control flow protection mechanism. The flagis target independent and currently appertains to a function or functionpointer.
  • shadowcallstack
  • This attribute indicates that the ShadowCallStack checks are enabled forthe function. The instrumentation checks that the return address for thefunction has not changed between the function prolog and eiplog. It iscurrently x86_64-specific.

Call Site Attributes

In addition to function attributes the following call site onlyattributes are supported:

  • vector-function-abi-variant
  • This attribute can be attached to a call to listthe vector functions associated to the function. Notice that theattribute cannot be attached to a invoke or acallbr instruction. The attribute consists of acomma separated list of mangled names. The order of the list doesnot imply preference (it is logically a set). The compiler is freeto pick any listed vector function of its choosing.

The syntax for the mangled names is as follows::

  1. _ZGV<isa><mask><vlen><parameters>_<scalar_name>[(<vector_redirection>)]

When present, the attribute informs the compiler that the function<scalarname> has a corresponding vector variant that can beused to perform the concurrent invocation of <scalar_name> onvectors. The shape of the vector function is described by thetokens between the prefix _ZGV and the <scalar_name>token. The standard name of the vector function is_ZGV<isa><mask><vlen><parameters><scalar_name>. When present,the optional token (<vector_redirection>) informs the compilerthat a custom name is provided in addition to the standard one(custom names can be provided for example via the use of declarevariant in OpenMP 5.0). The declaration of the variant must bepresent in the IR Module. The signature of the vector variant isdetermined by the rules of the Vector Function ABI (VFABI)specifications of the target. For Arm and X86, the VFABI can befound at https://github.com/ARM-software/abi-aa andhttps://software.intel.com/en-us/articles/vector-simd-function-abi,respectively.

For X86 and Arm targets, the values of the tokens in the standardname are those that are defined in the VFABI. LLVM has an internal<isa> token that can be used to create scalar-to-vectormappings for functions that are not directly associated to any ofthe target ISAs (for example, some of the mappings stored in theTargetLibraryInfo). Valid values for the <isa> token are::

  1. <isa>:= b | c | d | e -> X86 SSE, AVX, AVX2, AVX512
  2. | n | s -> Armv8 Advanced SIMD, SVE
  3. | __LLVM__ -> Internal LLVM Vector ISA

For all targets currently supported (x86, Arm and Internal LLVM),the remaining tokens can have the following values::

  1. <mask>:= M | N -> mask | no mask
  2.  
  3. <vlen>:= number -> number of lanes
  4. | x -> VLA (Vector Length Agnostic)
  5.  
  6. <parameters>:= v -> vector
  7. | l | l <number> -> linear
  8. | R | R <number> -> linear with ref modifier
  9. | L | L <number> -> linear with val modifier
  10. | U | U <number> -> linear with uval modifier
  11. | ls <pos> -> runtime linear
  12. | Rs <pos> -> runtime linear with ref modifier
  13. | Ls <pos> -> runtime linear with val modifier
  14. | Us <pos> -> runtime linear with uval modifier
  15. | u -> uniform
  16.  
  17. <scalar_name>:= name of the scalar function
  18.  
  19. <vector_redirection>:= optional, custom name of the vector function

Global Attributes

Attributes may be set to communicate additional information about a global variable.Unlike function attributes, attributes on a global variableare grouped into a single attribute group.

Operand Bundles

Operand bundles are tagged sets of SSA values that can be associatedwith certain LLVM instructions (currently only call s andinvoke s). In a way they are like metadata, but dropping them isincorrect and will change program semantics.

Syntax:

  1. operand bundle set ::= '[' operand bundle (, operand bundle )* ']'
  2. operand bundle ::= tag '(' [ bundle operand ] (, bundle operand )* ')'
  3. bundle operand ::= SSA value
  4. tag ::= string constant

Operand bundles are not part of a function’s signature, and agiven function may be called from multiple places with different kindsof operand bundles. This reflects the fact that the operand bundlesare conceptually a part of the call (or invoke), not thecallee being dispatched to.

Operand bundles are a generic mechanism intended to supportruntime-introspection-like functionality for managed languages. Whilethe exact semantics of an operand bundle depend on the bundle tag,there are certain limitations to how much the presence of an operandbundle can influence the semantics of a program. These restrictionsare described as the semantics of an “unknown” operand bundle. Aslong as the behavior of an operand bundle is describable within theserestrictions, LLVM does not need to have special knowledge of theoperand bundle to not miscompile programs containing it.

  • The bundle operands for an unknown operand bundle escape in unknownways before control is transferred to the callee or invokee.
  • Calls and invokes with operand bundles have unknown read / writeeffect on the heap on entry and exit (even if the call target isreadnone or readonly), unless they’re overridden withcallsite specific attributes.
  • An operand bundle at a call site cannot change the implementationof the called function. Inter-procedural optimizations work asusual as long as they take into account the first two properties.

More specific types of operand bundles are described below.

Deoptimization Operand Bundles

Deoptimization operand bundles are characterized by the "deopt"operand bundle tag. These operand bundles represent an alternate“safe” continuation for the call site they’re attached to, and can beused by a suitable runtime to deoptimize the compiled frame at thespecified call site. There can be at most one "deopt" operandbundle attached to a call site. Exact details of deoptimization isout of scope for the language reference, but it usually involvesrewriting a compiled frame into a set of interpreted frames.

From the compiler’s perspective, deoptimization operand bundles makethe call sites they’re attached to at least readonly. They readthrough all of their pointer typed operands (even if they’re nototherwise escaped) and the entire visible heap. Deoptimizationoperand bundles do not capture their operands except duringdeoptimization, in which case control will not be returned to thecompiled frame.

The inliner knows how to inline through calls that have deoptimizationoperand bundles. Just like inlining through a normal call siteinvolves composing the normal and exceptional continuations, inliningthrough a call site with a deoptimization operand bundle needs toappropriately compose the “safe” deoptimization continuation. Theinliner does this by prepending the parent’s deoptimizationcontinuation to every deoptimization continuation in the inlined body.E.g. inlining @f into @g in the following example

  1. define void @f() {
  2. call void @x() ;; no deopt state
  3. call void @y() [ "deopt"(i32 10) ]
  4. call void @y() [ "deopt"(i32 10), "unknown"(i8* null) ]
  5. ret void
  6. }
  7.  
  8. define void @g() {
  9. call void @f() [ "deopt"(i32 20) ]
  10. ret void
  11. }

will result in

  1. define void @g() {
  2. call void @x() ;; still no deopt state
  3. call void @y() [ "deopt"(i32 20, i32 10) ]
  4. call void @y() [ "deopt"(i32 20, i32 10), "unknown"(i8* null) ]
  5. ret void
  6. }

It is the frontend’s responsibility to structure or encode thedeoptimization state in a way that syntactically prepending thecaller’s deoptimization state to the callee’s deoptimization state issemantically equivalent to composing the caller’s deoptimizationcontinuation after the callee’s deoptimization continuation.

Funclet Operand Bundles

Funclet operand bundles are characterized by the "funclet"operand bundle tag. These operand bundles indicate that a call siteis within a particular funclet. There can be at most one"funclet" operand bundle attached to a call site and it must haveexactly one bundle operand.

If any funclet EH pads have been “entered” but not “exited” (per thedescription in the EH doc),it is undefined behavior to execute a call or invoke which:

  • does not have a "funclet" bundle and is not a call to a nounwindintrinsic, or
  • has a "funclet" bundle whose operand is not the most-recently-enterednot-yet-exited funclet EH pad.

Similarly, if no funclet EH pads have been entered-but-not-yet-exited,executing a call or invoke with a "funclet" bundle is undefined behavior.

GC Transition Operand Bundles

GC transition operand bundles are characterized by the"gc-transition" operand bundle tag. These operand bundles mark acall as a transition between a function with one GC strategy to afunction with a different GC strategy. If coordinating the transitionbetween GC strategies requires additional code generation at the callsite, these bundles may contain any values that are needed by thegenerated code. For more details, see GC Transitions.

Assume Operand Bundles

Operand bundles on an llvm.assume allows representingassumptions that a parameter attribute or afunction attribute holds for a certain value at a certainlocation. Operand bundles enable assumptions that are either hard or impossibleto represent as a boolean argument of an llvm.assume.

An assume operand bundle has the form:

  1. "<tag>"([ <holds for value> [, <attribute argument>] ])
  • The tag of the operand bundle is usually the name of attribute that can beassumed to hold. It can also be ignore, this tag doesn’t contain anyinformation and should be ignored.
  • The first argument if present is the value for which the attribute hold.
  • The second argument if present is an argument of the attribute.

If there are no arguments the attribute is a property of the call location.

If the represented attribute expects a constant argument, the argument providedto the operand bundle should be a constant as well.

For example:

  1. call void @llvm.assume(i1 true) ["align"(i32* %val, i32 8)]

allows the optimizer to assume that at location of call tollvm.assume %val has an alignment of at least 8.

  1. call void @llvm.assume(i1 %cond) ["cold"(), "nonnull"(i64* %val)]

allows the optimizer to assume that the llvm.assumecall location is cold and that %val may not be null.

Just like for the argument of llvm.assume, if any of theprovided guarantees are are violated at runtime the behavior is undefined.

Even if the assumed property can be encoded as a boolean value, likenonnull, using operand bundles to express the property can still havebenefits:

  • Attributes that can be expressed via operand bundles are directly theproperty that the optimizer uses and cares about. Encoding attributes asoperand bundles removes the need for an instruction sequence that representsthe property (e.g., icmp ne i32* %p, null for nonnull) and for theoptimizer to deduce the property from that instruction sequence.
  • Expressing the property using operand bundles makes it easy to identify theuse of the value as a use in an llvm.assume. This thensimplifies and improves heuristics, e.g., for use “use-sensitive”optimizations.

Module-Level Inline Assembly

Modules may contain “module-level inline asm” blocks, which correspondsto the GCC “file scope inline asm” blocks. These blocks are internallyconcatenated by LLVM and treated as a single unit, but may be separatedin the .ll file if desired. The syntax is very simple:

  1. module asm "inline asm code goes here"
  2. module asm "more can go here"

The strings can contain any character by escaping non-printablecharacters. The escape sequence used is simply “\xx” where “xx” is thetwo digit hex code for the number.

Note that the assembly string must be parseable by LLVM’s integrated assembler(unless it is disabled), even when emitting a .s file.

Data Layout

A module may specify a target specific data layout string that specifieshow data is to be laid out in memory. The syntax for the data layout issimply:

  1. target datalayout = "layout specification"

The layout specification consists of a list of specificationsseparated by the minus sign character (‘-‘). Each specification startswith a letter and may include other information after the letter todefine some aspect of the data layout. The specifications accepted areas follows:

  • E
  • Specifies that the target lays out data in big-endian form. That is,the bits with the most significance have the lowest addresslocation.
  • e
  • Specifies that the target lays out data in little-endian form. Thatis, the bits with the least significance have the lowest addresslocation.
  • S<size>
  • Specifies the natural alignment of the stack in bits. Alignmentpromotion of stack variables is limited to the natural stackalignment to avoid dynamic stack realignment. The stack alignmentmust be a multiple of 8-bits. If omitted, the natural stackalignment defaults to “unspecified”, which does not prevent anyalignment promotions.
  • P<address space>
  • Specifies the address space that corresponds to program memory.Harvard architectures can use this to specify what space LLVMshould place things such as functions into. If omitted, theprogram memory space defaults to the default address space of 0,which corresponds to a Von Neumann architecture that has codeand data in the same space.
  • A<address space>
  • Specifies the address space of objects created by ‘alloca’.Defaults to the default address space of 0.
  • p[n]:<size>:<abi>:<pref>:<idx>
  • This specifies the size of a pointer and its <abi> and<pref>erred alignments for address space n. The fourth parameter<idx> is a size of index that used for address calculation. If notspecified, the default index size is equal to the pointer size. All sizesare in bits. The address space, n, is optional, and if not specified,denotes the default address space 0. The value of n must bein the range [1,2^23).
  • i<size>:<abi>:<pref>
  • This specifies the alignment for an integer type of a given bit<size>. The value of <size> must be in the range [1,2^23).
  • v<size>:<abi>:<pref>
  • This specifies the alignment for a vector type of a given bit<size>.
  • f<size>:<abi>:<pref>
  • This specifies the alignment for a floating-point type of a given bit<size>. Only values of <size> that are supported by the targetwill work. 32 (float) and 64 (double) are supported on all targets; 80or 128 (different flavors of long double) are also supported on sometargets.
  • a:<abi>:<pref>
  • This specifies the alignment for an object of aggregate type.
  • F<type><abi>
  • This specifies the alignment for function pointers.The options for <type> are:

    • i: The alignment of function pointers is independent of the alignmentof functions, and is a multiple of <abi>.
    • n: The alignment of function pointers is a multiple of the explicitalignment specified on the function, and is a multiple of <abi>.
  • m:<mangling>
  • If present, specifies that llvm names are mangled in the output. Symbolsprefixed with the mangling escape character \01 are passed throughdirectly to the assembler without the escape character. The mangling styleoptions are

    • e: ELF mangling: Private symbols get a .L prefix.
    • m: Mips mangling: Private symbols get a $ prefix.
    • o: Mach-O mangling: Private symbols get L prefix. Othersymbols get a _ prefix.
    • x: Windows x86 COFF mangling: Private symbols get the usual prefix.Regular C symbols get a _ prefix. Functions with stdcall,fastcall, and __vectorcall have custom mangling that appends@N where N is the number of bytes used to pass parameters. C++ symbolsstarting with ? are not mangled in any way.
    • w: Windows COFF mangling: Similar to x, except that normal Csymbols do not receive a _ prefix.
  • n<size1>:<size2>:<size3>…
  • This specifies a set of native integer widths for the target CPU inbits. For example, it might contain n32 for 32-bit PowerPC,n32:64 for PowerPC 64, or n8:16:32:64 for X86-64. Elements ofthis set are considered to support most general arithmetic operationsefficiently.
  • ni:<address space0>:<address space1>:<address space2>…
  • This specifies pointer types with the specified address spacesas Non-Integral Pointer Type s. The 0address space cannot be specified as non-integral.

On every specification that takes a <abi>:<pref>, specifying the<pref> alignment is optional. If omitted, the preceding :should be omitted too and <pref> will be equal to <abi>.

When constructing the data layout for a given target, LLVM starts with adefault set of specifications which are then (possibly) overridden bythe specifications in the datalayout keyword. The defaultspecifications are given in this list:

  • E - big endian
  • p:64:64:64 - 64-bit pointers with 64-bit alignment.
  • p[n]:64:64:64 - Other address spaces are assumed to be thesame as the default address space.
  • S0 - natural stack alignment is unspecified
  • i1:8:8 - i1 is 8-bit (byte) aligned
  • i8:8:8 - i8 is 8-bit (byte) aligned
  • i16:16:16 - i16 is 16-bit aligned
  • i32:32:32 - i32 is 32-bit aligned
  • i64:32:64 - i64 has ABI alignment of 32-bits but preferredalignment of 64-bits
  • f16:16:16 - half is 16-bit aligned
  • f32:32:32 - float is 32-bit aligned
  • f64:64:64 - double is 64-bit aligned
  • f128:128:128 - quad is 128-bit aligned
  • v64:64:64 - 64-bit vector is 64-bit aligned
  • v128:128:128 - 128-bit vector is 128-bit aligned
  • a:0:64 - aggregates are 64-bit aligned

When LLVM is determining the alignment for a given type, it uses thefollowing rules:

  • If the type sought is an exact match for one of the specifications,that specification is used.
  • If no match is found, and the type sought is an integer type, thenthe smallest integer type that is larger than the bitwidth of thesought type is used. If none of the specifications are larger thanthe bitwidth then the largest integer type is used. For example,given the default specifications above, the i7 type will use thealignment of i8 (next largest) while both i65 and i256 will use thealignment of i64 (largest specified).
  • If no match is found, and the type sought is a vector type, then thelargest vector type that is smaller than the sought vector type willbe used as a fall back. This happens because <128 x double> can beimplemented in terms of 64 <2 x double>, for example.The function of the data layout string may not be what you expect.Notably, this is not a specification from the frontend of what alignmentthe code generator should use.

Instead, if specified, the target data layout is required to match whatthe ultimate code generator expects. This string is used by themid-level optimizers to improve code, and this only works if it matcheswhat the ultimate code generator uses. There is no way to generate IRthat does not embed this target-specific detail into the IR. If youdon’t specify the string, the default specifications will be used togenerate a Data Layout and the optimization phases will operateaccordingly and introduce target specificity into the IR with respect tothese default specifications.

Target Triple

A module may specify a target triple string that describes the targethost. The syntax for the target triple is simply:

  1. target triple = "x86_64-apple-macosx10.7.0"

The target triple string consists of a series of identifiers delimitedby the minus sign character (‘-‘). The canonical forms are:

  1. ARCHITECTURE-VENDOR-OPERATING_SYSTEM
  2. ARCHITECTURE-VENDOR-OPERATING_SYSTEM-ENVIRONMENT

This information is passed along to the backend so that it generatescode for the proper architecture. It’s possible to override this on thecommand line with the -mtriple command line option.

Pointer Aliasing Rules

Any memory access must be done through a pointer value associated withan address range of the memory access, otherwise the behavior isundefined. Pointer values are associated with address ranges accordingto the following rules:

  • A pointer value is associated with the addresses associated with anyvalue it is based on.
  • An address of a global variable is associated with the address rangeof the variable’s storage.
  • The result value of an allocation instruction is associated with theaddress range of the allocated storage.
  • A null pointer in the default address-space is associated with noaddress.
  • An undef value in any address-space isassociated with no address.
  • An integer constant other than zero or a pointer value returned froma function not defined within LLVM may be associated with addressranges allocated through mechanisms other than those provided byLLVM. Such ranges shall not overlap with any ranges of addressesallocated by mechanisms provided by LLVM.

A pointer value is based on another pointer value according to thefollowing rules:

  • A pointer value formed from a scalar getelementptr operation is based onthe pointer-typed operand of the getelementptr.
  • The pointer in lane l of the result of a vector getelementptr operationis based on the pointer in lane l of the vector-of-pointers-typed operandof the getelementptr.
  • The result value of a bitcast is based on the operand of thebitcast.
  • A pointer value formed by an inttoptr is based on all pointervalues that contribute (directly or indirectly) to the computation ofthe pointer’s value.
  • The “based on” relationship is transitive.

Note that this definition of “based” is intentionally similar to thedefinition of “based” in C99, though it is slightly weaker.

LLVM IR does not associate types with memory. The result type of aload merely indicates the size and alignment of the memory fromwhich to load, as well as the interpretation of the value. The firstoperand type of a store similarly only indicates the size andalignment of the store.

Consequently, type-based alias analysis, aka TBAA, aka-fstrict-aliasing, is not applicable to general unadorned LLVM IR.Metadata may be used to encode additional informationwhich specialized optimization passes may use to implement type-basedalias analysis.

Volatile Memory Accesses

Certain memory accesses, such as load’s,store’s, and llvm.memcpy’s may bemarked volatile. The optimizers must not change the number ofvolatile operations or change their order of execution relative to othervolatile operations. The optimizers may change the order of volatileoperations relative to non-volatile operations. This is not Java’s“volatile” and has no cross-thread synchronization behavior.

A volatile load or store may have additional target-specific semantics.Any volatile operation can have side effects, and any volatile operationcan read and/or modify state which is not accessible via a regular loador store in this module. Volatile operations may use addresses which donot point to memory (like MMIO registers). This means the compiler maynot use a volatile operation to prove a non-volatile access to thataddress has defined behavior.

The allowed side-effects for volatile accesses are limited. If anon-volatile store to a given address would be legal, a volatileoperation may modify the memory at that address. A volatile operationmay not modify any other memory accessible by the module being compiled.A volatile operation may not call any code in the current module.

The compiler may assume execution will continue after a volatile operation,so operations which modify memory or may have undefined behavior can behoisted past a volatile operation.

IR-level volatile loads and stores cannot safely be optimized into llvm.memcpyor llvm.memmove intrinsics even when those intrinsics are flagged volatile.Likewise, the backend should never split or merge target-legal volatileload/store instructions. Similarly, IR-level volatile loads and stores cannotchange from integer to floating-point or vice versa.

Rationale

Platforms may rely on volatile loads and stores of natively supporteddata width to be executed as single instruction. For example, in Cthis holds for an l-value of volatile primitive type with nativehardware support, but not necessarily for aggregate types. Thefrontend upholds these expectations, which are intentionallyunspecified in the IR. The rules above ensure that IR transformationsdo not violate the frontend’s contract with the language.

Memory Model for Concurrent Operations

The LLVM IR does not define any way to start parallel threads ofexecution or to register signal handlers. Nonetheless, there areplatform-specific ways to create them, and we define LLVM IR’s behaviorin their presence. This model is inspired by the C++0x memory model.

For a more informal introduction to this model, see the LLVM Atomic Instructions and Concurrency Guide.

We define a happens-before partial order as the least partial orderthat

  • Is a superset of single-thread program order, and
  • When a synchronizes-with b, includes an edge from a tob. Synchronizes-with pairs are introduced by platform-specifictechniques, like pthread locks, thread creation, thread joining,etc., and by atomic instructions. (See also Atomic Memory OrderingConstraints).

Note that program order does not introduce happens-before edgesbetween a thread and signals executing inside that thread.

Every (defined) read operation (load instructions, memcpy, atomicloads/read-modify-writes, etc.) R reads a series of bytes written by(defined) write operations (store instructions, atomicstores/read-modify-writes, memcpy, etc.). For the purposes of thissection, initialized globals are considered to have a write of theinitializer which is atomic and happens before any other read or writeof the memory in question. For each byte of a read R, Rbytemay see any write to the same byte, except:

  • If write1 happens before write2, andwrite2 happens before Rbyte, thenRbyte does not see write1.
  • If Rbyte happens before write3, thenRbyte does not see write3.

Given that definition, Rbyte is defined as follows:

  • If R is volatile, the result is target-dependent. (Volatile issupposed to give guarantees which can support sig_atomic_t inC/C++, and may be used for accesses to addresses that do not behavelike normal memory. It does not generally provide cross-threadsynchronization.)
  • Otherwise, if there is no write to the same byte that happens beforeRbyte, Rbyte returns undef for that byte.
  • Otherwise, if Rbyte may see exactly one write,Rbyte returns the value written by that write.
  • Otherwise, if R is atomic, and all the writes Rbyte maysee are atomic, it chooses one of the values written. See the AtomicMemory Ordering Constraints section for additionalconstraints on how the choice is made.
  • Otherwise Rbyte returns undef.

R returns the value composed of the series of bytes it read. Thisimplies that some bytes within the value may be undef withoutthe entire value being undef. Note that this only defines thesemantics of the operation; it doesn’t mean that targets will emit morethan one instruction to read the series of bytes.

Note that in cases where none of the atomic intrinsics are used, thismodel places only one restriction on IR transformations on top of whatis required for single-threaded execution: introducing a store to a bytewhich might not otherwise be stored is not allowed in general.(Specifically, in the case where another thread might write to and readfrom an address, introducing a store can change a load that may seeexactly one write into a load that may see multiple writes.)

Atomic Memory Ordering Constraints

Atomic instructions (cmpxchg,atomicrmw, fence,atomic load, and atomic store) takeordering parameters that determine which other atomic instructions onthe same address they synchronize with. These semantics are borrowedfrom Java and C++0x, but are somewhat more colloquial. If thesedescriptions aren’t precise enough, check those specs (see specreferences in the atomics guide).fence instructions treat these orderings somewhatdifferently since they don’t take an address. See that instruction’sdocumentation for details.

For a simpler introduction to the ordering constraints, see theLLVM Atomic Instructions and Concurrency Guide.

  • unordered
  • The set of values that can be read is governed by the happens-beforepartial order. A value cannot be read unless some operation wroteit. This is intended to provide a guarantee strong enough to modelJava’s non-volatile shared variables. This ordering cannot bespecified for read-modify-write operations; it is not strong enoughto make them atomic in any interesting way.
  • monotonic
  • In addition to the guarantees of unordered, there is a singletotal order for modifications by monotonic operations on eachaddress. All modification orders must be compatible with thehappens-before order. There is no guarantee that the modificationorders can be combined to a global total order for the whole program(and this often will not be possible). The read in an atomicread-modify-write operation (cmpxchg andatomicrmw) reads the value in the modificationorder immediately before the value it writes. If one atomic readhappens before another atomic read of the same address, the laterread must see the same value or a later value in the address’smodification order. This disallows reordering of monotonic (orstronger) operations on the same address. If an address is writtenmonotonic-ally by one thread, and other threads monotonic-allyread that address repeatedly, the other threads must eventually seethe write. This corresponds to the C++0x/C1xmemory_order_relaxed.
  • acquire
  • In addition to the guarantees of monotonic, asynchronizes-with edge may be formed with a release operation.This is intended to model C++’s memory_order_acquire.
  • release
  • In addition to the guarantees of monotonic, if this operationwrites a value which is subsequently read by an acquireoperation, it synchronizes-with that operation. (This isn’t acomplete description; see the C++0x definition of a releasesequence.) This corresponds to the C++0x/C1xmemory_order_release.
  • acq_rel (acquire+release)
  • Acts as both an acquire and release operation on itsaddress. This corresponds to the C++0x/C1x memory_order_acq_rel.
  • seq_cst (sequentially consistent)
  • In addition to the guarantees of acqrel (acquire for anoperation that only reads, release for an operation that onlywrites), there is a global total order on allsequentially-consistent operations on all addresses, which isconsistent with the _happens-before partial order and with themodification orders of all the affected addresses. Eachsequentially-consistent read sees the last preceding write to thesame address in this global order. This corresponds to the C++0x/C1xmemory_order_seq_cst and Java volatile.

If an atomic operation is marked syncscope("singlethread"), it onlysynchronizes with and only participates in the seq_cst total orderings ofother operations running in the same thread (for example, in signal handlers).

If an atomic operation is marked syncscope("<target-scope>"), where<target-scope> is a target specific synchronization scope, then it is targetdependent if it synchronizes with and participates in the seq_cst totalorderings of other operations.

Otherwise, an atomic operation that is not marked syncscope("singlethread")or syncscope("<target-scope>") synchronizes with and participates in theseq_cst total orderings of other operations that are not markedsyncscope("singlethread") or syncscope("<target-scope>").

Floating-Point Environment

The default LLVM floating-point environment assumes that floating-pointinstructions do not have side effects. Results assume the round-to-nearestrounding mode. No floating-point exception state is maintained in thisenvironment. Therefore, there is no attempt to create or preserve invalidoperation (SNaN) or division-by-zero exceptions.

The benefit of this exception-free assumption is that floating-pointoperations may be speculated freely without any other fast-math relaxationsto the floating-point model.

Code that requires different behavior than this should use theConstrained Floating-Point Intrinsics.

Fast-Math Flags

LLVM IR floating-point operations (fneg, fadd,fsub, fmul, fdiv,frem, fcmp), phi,select and callmay use the following flags to enable otherwise unsafefloating-point transformations.

  • nnan
  • No NaNs - Allow optimizations to assume the arguments and result are notNaN. If an argument is a nan, or the result would be a nan, it producesa poison value instead.
  • ninf
  • No Infs - Allow optimizations to assume the arguments and result are not+/-Inf. If an argument is +/-Inf, or the result would be +/-Inf, itproduces a poison value instead.
  • nsz
  • No Signed Zeros - Allow optimizations to treat the sign of a zeroargument or result as insignificant.
  • arcp
  • Allow Reciprocal - Allow optimizations to use the reciprocal of anargument rather than perform division.
  • contract
  • Allow floating-point contraction (e.g. fusing a multiply followed by anaddition into a fused multiply-and-add).
  • afn
  • Approximate functions - Allow substitution of approximate calculations forfunctions (sin, log, sqrt, etc). See floating-point intrinsic definitionsfor places where this can apply to LLVM’s intrinsic math functions.
  • reassoc
  • Allow reassociation transformations for floating-point instructions.This may dramatically change results in floating-point.
  • fast
  • This flag implies all of the others.

Use-list Order Directives

Use-list directives encode the in-memory order of each use-list, allowing theorder to be recreated. <order-indexes> is a comma-separated list ofindexes that are assigned to the referenced value’s uses. The referencedvalue’s use-list is immediately sorted by these indexes.

Use-list directives may appear at function scope or global scope. They are notinstructions, and have no effect on the semantics of the IR. When they’re atfunction scope, they must appear after the terminator of the final basic block.

If basic blocks have their address taken via blockaddress() expressions,uselistorder_bb can be used to reorder their use-lists from outside theirfunction’s scope.

Syntax:
  1. uselistorder <ty> <value>, { <order-indexes> }
  2. uselistorder_bb @function, %block { <order-indexes> }
Examples:
  1. define void @foo(i32 %arg1, i32 %arg2) {
  2. entry:
  3. ; ... instructions ...
  4. bb:
  5. ; ... instructions ...
  6.  
  7. ; At function scope.
  8. uselistorder i32 %arg1, { 1, 0, 2 }
  9. uselistorder label %bb, { 1, 0 }
  10. }
  11.  
  12. ; At global scope.
  13. uselistorder i32* @global, { 1, 2, 0 }
  14. uselistorder i32 7, { 1, 0 }
  15. uselistorder i32 (i32) @bar, { 1, 0 }
  16. uselistorder_bb @foo, %bb, { 5, 1, 3, 2, 0, 4 }

Source Filename

The source filename string is set to the original module identifier,which will be the name of the compiled source file when compiling fromsource through the clang front end, for example. It is then preserved throughthe IR and bitcode.

This is currently necessary to generate a consistent unique globalidentifier for local functions used in profile data, which prepends thesource file name to the local function name.

The syntax for the source file name is simply:

source_filename = "/path/to/source.c"

Type System

The LLVM type system is one of the most important features of theintermediate representation. Being typed enables a number ofoptimizations to be performed on the intermediate representationdirectly, without having to do extra analyses on the side before thetransformation. A strong type system makes it easier to read thegenerated code and enables novel analyses and transformations that arenot feasible to perform on normal three address code representations.

Void Type

Overview:

The void type does not represent any value and has no size.

Syntax:
void

Function Type

Overview:

The function type can be thought of as a function signature. It consists of areturn type and a list of formal parameter types. The return type of a functiontype is a void type or first class type — except for labeland metadata types.

Syntax:
<returntype> (<parameter list>)

…where ‘<parameter list>’ is a comma-separated list of typespecifiers. Optionally, the parameter list may include a type , whichindicates that the function takes a variable number of arguments. Variableargument functions can access their arguments with the variable argumenthandling intrinsic functions. ‘<returntype>’ is any typeexcept label and metadata.

Examples:
i32 (i32)function taking an i32, returning an i32
float (i16, i32 ) Pointer to a function that takes an i16 and a pointer to i32, returning float.
i32 (i8*, …)A vararg function that takes at least one pointer to i8 (char in C), which returns an integer. This is the signature for printf in LLVM.
{i32, i32} (i32)A function taking an i32, returning a structure containing two i32 values

First Class Types

The first class types are perhaps the most important.Values of these types are the only ones which can be produced byinstructions.

Single Value Types

These are the types that are valid in registers from CodeGen’s perspective.

Integer Type
Overview:

The integer type is a very simple type that simply specifies anarbitrary bit width for the integer type desired. Any bit width from 1bit to 223-1 (about 8 million) can be specified.

Syntax:
iN

The number of bits the integer will occupy is specified by the Nvalue.

Examples:
i1a single-bit integer.
i32a 32-bit integer.
i1942652a really big integer of over 1 million bits.
Floating-Point Types
TypeDescription
half16-bit floating-point value
float32-bit floating-point value
double64-bit floating-point value
fp128128-bit floating-point value (112-bit mantissa)
x86_fp8080-bit floating-point value (X87)
ppc_fp128128-bit floating-point value (two 64-bits)

The binary format of half, float, double, and fp128 correspond to theIEEE-754-2008 specifications for binary16, binary32, binary64, and binary128respectively.

X86_mmx Type
Overview:

The x86_mmx type represents a value held in an MMX register on an x86machine. The operations allowed on it are quite limited: parameters andreturn values, load and store, and bitcast. User-specified MMXinstructions are represented as intrinsic or asm calls with argumentsand/or results of this type. There are no arrays, vectors or constantsof this type.

Syntax:
x86_mmx
Pointer Type
Overview:

The pointer type is used to specify memory locations. Pointers arecommonly used to reference objects in memory.

Pointer types may have an optional address space attribute defining thenumbered address space where the pointed-to object resides. The defaultaddress space is number zero. The semantics of non-zero address spacesare target-specific.

Note that LLVM does not permit pointers to void (void) nor does itpermit pointers to labels (label). Use i8* instead.

Syntax:
<type> *
Examples:
[4 x i32]A pointer to array of four i32 values.
i32 (i32) A pointer to a function that takes an i32, returning an i32.
i32 addrspace(5)*A pointer to an i32 value that resides in address space #5.
Vector Type
Overview:

A vector type is a simple derived type that represents a vector ofelements. Vector types are used when multiple primitive data areoperated in parallel using a single instruction (SIMD). A vector typerequires a size (number of elements), an underlying primitive data type,and a scalable property to represent vectors where the exact hardwarevector length is unknown at compile time. Vector types are consideredfirst class.

Syntax:
< <# elements> x <elementtype> >          ; Fixed-length vector
< vscale x <# elements> x <elementtype> > ; Scalable vector

The number of elements is a constant integer value larger than 0;elementtype may be any integer, floating-point or pointer type. Vectorsof size zero are not allowed. For scalable vectors, the total number ofelements is a constant multiple (called vscale) of the specified numberof elements; vscale is a positive integer that is unknown at compile timeand the same hardware-dependent constant for all scalable vectors at runtime. The size of a specific scalable vector type is thus constant withinIR, even if the exact size in bytes cannot be determined until run time.

Examples:
<4 x i32>Vector of 4 32-bit integer values.
<8 x float>Vector of 8 32-bit floating-point values.
<2 x i64>Vector of 2 64-bit integer values.
<4 x i64*>Vector of 4 pointers to 64-bit integer values.
<vscale x 4 x i32>Vector with a multiple of 4 32-bit integer values.

Label Type

Overview:

The label type represents code labels.

Syntax:
label

Token Type

Overview:

The token type is used when a value is associated with an instructionbut all uses of the value must not attempt to introspect or obscure it.As such, it is not appropriate to have a phi orselect of type token.

Syntax:
token

Metadata Type

Overview:

The metadata type represents embedded metadata. No derived types may becreated from metadata except for function arguments.

Syntax:
metadata

Aggregate Types

Aggregate Types are a subset of derived types that can contain multiplemember types. Arrays and structs areaggregate types. Vectors are not considered to beaggregate types.

Array Type
Overview:

The array type is a very simple derived type that arranges elementssequentially in memory. The array type requires a size (number ofelements) and an underlying data type.

Syntax:
[<# elements> x <elementtype>]

The number of elements is a constant integer value; elementtype maybe any type with a size.

Examples:
[40 x i32]Array of 40 32-bit integer values.
[41 x i32]Array of 41 32-bit integer values.
[4 x i8]Array of 4 8-bit integer values.

Here are some examples of multidimensional arrays:

[3 x [4 x i32]]3x4 array of 32-bit integer values.
[12 x [10 x float]]12x10 array of single precision floating-point values.
[2 x [3 x [4 x i16]]]2x3x4 array of 16-bit integer values.

There is no restriction on indexing beyond the end of the array impliedby a static type (though there are restrictions on indexing beyond thebounds of an allocated object in some cases). This means thatsingle-dimension ‘variable sized array’ addressing can be implemented inLLVM with a zero length array type. An implementation of ‘pascal stylearrays’ in LLVM could use the type “{ i32, [0 x float]}”, forexample.

Structure Type
Overview:

The structure type is used to represent a collection of data memberstogether in memory. The elements of a structure may be any type that hasa size.

Structures in memory are accessed using ‘load’ and ‘store’ bygetting a pointer to a field with the ‘getelementptr’ instruction.Structures in registers are accessed using the ‘extractvalue’ and‘insertvalue’ instructions.

Structures may optionally be “packed” structures, which indicate thatthe alignment of the struct is one byte, and that there is no paddingbetween the elements. In non-packed structs, padding between field typesis inserted as defined by the DataLayout string in the module, which isrequired to match what the underlying code generator expects.

Structures can either be “literal” or “identified”. A literal structureis defined inline with other types (e.g. {i32, i32}*) whereasidentified types are always defined at the top level with a name.Literal types are uniqued by their contents and can never be recursiveor opaque since there is no way to write one. Identified types can berecursive, can be opaqued, and are never uniqued.

Syntax:
%T1 = type { <type list> }     ; Identified normal struct type
%T2 = type <{ <type list> }>   ; Identified packed struct type
Examples:
{ i32, i32, i32 }A triple of three i32 values
{ float, i32 (i32) * }A pair, where the first element is a float and the second element is a pointer to a function that takes an i32, returning an i32.
<{ i8, i32 }>A packed struct known to be 5 bytes in size.
Opaque Structure Types
Overview:

Opaque structure types are used to represent named structure types thatdo not have a body specified. This corresponds (for example) to the Cnotion of a forward declared structure.

Syntax:
%X = type opaque
%52 = type opaque
Examples:
opaqueAn opaque type.

Constants

LLVM has several different basic types of constants. This sectiondescribes them all and their syntax.

Simple Constants

  • Boolean constants
  • The two strings ‘true’ and ‘false’ are both valid constantsof the i1 type.
  • Integer constants
  • Standard integers (such as ‘4’) are constants of theinteger type. Negative numbers may be used withinteger types.
  • Floating-point constants
  • Floating-point constants use standard decimal notation (e.g.123.421), exponential notation (e.g. 1.23421e+2), or a more precisehexadecimal notation (see below). The assembler requires the exactdecimal value of a floating-point constant. For example, theassembler accepts 1.25 but rejects 1.3 because 1.3 is a repeatingdecimal in binary. Floating-point constants must have afloating-point type.
  • Null pointer constants
  • The identifier ‘null’ is recognized as a null pointer constantand must be of pointer type.
  • Token constants
  • The identifier ‘none’ is recognized as an empty token constantand must be of token type.

The one non-intuitive notation for constants is the hexadecimal form offloating-point constants. For example, the form‘double 0x432ff973cafa8000’ is equivalent to (but harder to readthan) ‘double 4.5e+15’. The only time hexadecimal floating-pointconstants are required (and the only time that they are generated by thedisassembler) is when a floating-point constant must be emitted but itcannot be represented as a decimal floating-point number in a reasonablenumber of digits. For example, NaN’s, infinities, and other specialvalues are represented in their IEEE hexadecimal format so that assemblyand disassembly do not cause any bits to change in the constants.

When using the hexadecimal form, constants of types half, float, anddouble are represented using the 16-digit form shown above (whichmatches the IEEE754 representation for double); half and float valuesmust, however, be exactly representable as IEEE 754 half and singleprecision, respectively. Hexadecimal format is always used for longdouble, and there are three forms of long double. The 80-bit format usedby x86 is represented as 0xK followed by 20 hexadecimal digits. The128-bit format used by PowerPC (two adjacent doubles) is represented by0xM followed by 32 hexadecimal digits. The IEEE 128-bit format isrepresented by 0xL followed by 32 hexadecimal digits. Long doubleswill only work if they match the long double format on your target.The IEEE 16-bit format (half precision) is represented by 0xHfollowed by 4 hexadecimal digits. All hexadecimal formats are big-endian(sign bit at the left).

There are no constants of type x86_mmx.

Complex Constants

Complex constants are a (potentially recursive) combination of simpleconstants and smaller complex constants.

  • Structure constants
  • Structure constants are represented with notation similar tostructure type definitions (a comma separated list of elements,surrounded by braces ({})). For example:“{ i32 4, float 17.0, i32* @G }”, where “@G” is declared as“@G = external global i32”. Structure constants must havestructure type, and the number and types of elementsmust match those specified by the type.
  • Array constants
  • Array constants are represented with notation similar to array typedefinitions (a comma separated list of elements, surrounded bysquare brackets ([])). For example:“[ i32 42, i32 11, i32 74 ]”. Array constants must havearray type, and the number and types of elements mustmatch those specified by the type. As a special case, character arrayconstants may also be represented as a double-quoted string using the cprefix. For example: “c"Hello World\0A\00"”.
  • Vector constants
  • Vector constants are represented with notation similar to vectortype definitions (a comma separated list of elements, surrounded byless-than/greater-than’s (<>)). For example:“< i32 42, i32 11, i32 74, i32 100 >”. Vector constantsmust have vector type, and the number and types ofelements must match those specified by the type.
  • Zero initialization
  • The string ‘zeroinitializer’ can be used to zero initialize avalue to zero of any type, including scalar andaggregate types. This is often used to avoidhaving to print large zero initializers (e.g. for large arrays) andis always exactly equivalent to using explicit zero initializers.
  • Metadata node
  • A metadata node is a constant tuple without types. For example:“!{!0, !{!2, !0}, !"test"}”. Metadata can reference constant values,for example: “!{!0, i32 0, i8 @global, i64 (i64) @function, !"str"}”.Unlike other typed constants that are meant to be interpreted as part ofthe instruction stream, metadata is a place to attach additionalinformation such as debug info.

Global Variable and Function Addresses

The addresses of global variables andfunctions are always implicitly valid(link-time) constants. These constants are explicitly referenced whenthe identifier for the global is used and always havepointer type. For example, the following is a legal LLVMfile:

@X = global i32 17@Y = global i32 42@Z = global [2 x i32] [ i32 @X, i32* @Y ]

Undefined Values

The string ‘undef’ can be used anywhere a constant is expected, andindicates that the user of the value may receive an unspecifiedbit-pattern. Undefined values may be of any type (other than ‘label’or ‘void’) and be used anywhere a constant is permitted.

Undefined values are useful because they indicate to the compiler thatthe program is well defined no matter what value is used. This gives thecompiler more freedom to optimize. Here are some examples of(potentially surprising) transformations that are valid (in pseudo IR):

  %A = add %X, undef
  %B = sub %X, undef
  %C = xor %X, undef
Safe:
  %A = undef
  %B = undef
  %C = undef

This is safe because all of the output bits are affected by the undefbits. Any output bit can have a zero or one depending on the input bits.

  %A = or %X, undef
  %B = and %X, undef
Safe:
  %A = -1
  %B = 0
Safe:
  %A = %X  ;; By choosing undef as 0
  %B = %X  ;; By choosing undef as -1
Unsafe:
  %A = undef
  %B = undef

These logical operations have bits that are not always affected by theinput. For example, if %X has a zero bit, then the output of the‘and’ operation will always be a zero for that bit, no matter whatthe corresponding bit from the ‘undef’ is. As such, it is unsafe tooptimize or assume that the result of the ‘and’ is ‘undef’.However, it is safe to assume that all bits of the ‘undef’ could be0, and optimize the ‘and’ to 0. Likewise, it is safe to assume thatall the bits of the ‘undef’ operand to the ‘or’ could be set,allowing the ‘or’ to be folded to -1.

  %A = select undef, %X, %Y
  %B = select undef, 42, %Y
  %C = select %X, %Y, undef
Safe:
  %A = %X     (or %Y)
  %B = 42     (or %Y)
  %C = %Y
Unsafe:
  %A = undef
  %B = undef
  %C = undef

This set of examples shows that undefined ‘select’ (and conditionalbranch) conditions can go either way, but they have to come from oneof the two operands. In the %A example, if %X and %Y wereboth known to have a clear low bit, then %A would have to have acleared low bit. However, in the %C example, the optimizer isallowed to assume that the ‘undef’ operand could be the same as%Y, allowing the whole ‘select’ to be eliminated.

  %A = xor undef, undef

  %B = undef
  %C = xor %B, %B

  %D = undef
  %E = icmp slt %D, 4
  %F = icmp gte %D, 4

Safe:
  %A = undef
  %B = undef
  %C = undef
  %D = undef
  %E = undef
  %F = undef

This example points out that two ‘undef’ operands are notnecessarily the same. This can be surprising to people (and also matchesC semantics) where they assume that “X^X” is always zero, even ifX is undefined. This isn’t true for a number of reasons, but theshort answer is that an ‘undef’ “variable” can arbitrarily changeits value over its “live range”. This is true because the variabledoesn’t actually have a live range. Instead, the value is logicallyread from arbitrary registers that happen to be around when needed, sothe value is not necessarily consistent over time. In fact, %A and%C need to have the same semantics or the core LLVM “replace alluses with” concept would not hold.

To ensure all uses of a given register observe the same value (even if‘undef’), the freeze instruction can be used.

  %A = sdiv undef, %X
  %B = sdiv %X, undef
Safe:
  %A = 0
b: unreachable

These examples show the crucial difference between an undefined value_and _undefined behavior. An undefined value (like ‘undef’) isallowed to have an arbitrary bit-pattern. This means that the %Aoperation can be constant folded to ‘0’, because the ‘undef’could be zero, and zero divided by any value is zero.However, in the second example, we can make a more aggressiveassumption: because the undef is allowed to be an arbitrary value,we are allowed to assume that it could be zero. Since a divide by zerohas undefined behavior, we are allowed to assume that the operationdoes not execute at all. This allows us to delete the divide and allcode after it. Because the undefined operation “can’t happen”, theoptimizer can assume that it occurs in dead code.

a:  store undef -> %X
b:  store %X -> undef
Safe:
a: <deleted>
b: unreachable

A store of an undefined value can be assumed to not have any effect;we can assume that the value is overwritten with bits that happen tomatch what was already there. However, a store to an undefinedlocation could clobber arbitrary memory, therefore, it has undefinedbehavior.

MemorySanitizer, a detector of uses of uninitialized memory,defines a branch with condition that depends on an undef value (orcertain other values, like e.g. a result of a load from heap-allocatedmemory that has never been stored to) to have an externally visibleside effect. For this reason functions with _sanitize_memory_attribute are not allowed to produce such branches “out of thinair”. More strictly, an optimization that inserts a conditional branchis only valid if in all executions where the branch condition has atleast one undefined bit, the same branch condition is evaluated in theinput IR as well.

Poison Values

In order to facilitate speculative execution, many instructions do notinvoke immediate undefined behavior when provided with illegal operands,and return a poison value instead.

There is currently no way of representing a poison value in the IR; theyonly exist when produced by operations such as add withthe nsw flag.

Poison value behavior is defined in terms of value dependence:

  • Values other than phi nodes and selectinstructions depend on their operands.
  • Phi nodes depend on the operand corresponding totheir dynamic predecessor basic block.
  • Select instructions depend on their condition operand and theirselected operand.
  • Function arguments depend on the corresponding actual argument valuesin the dynamic callers of their functions.
  • Call instructions depend on the retinstructions that dynamically transfer control back to them.
  • Invoke instructions depend on theret, resume, or exception-throwingcall instructions that dynamically transfer control back to them.
  • Non-volatile loads and stores depend on the most recent stores to allof the referenced memory addresses, following the order in the IR(including loads and stores implied by intrinsics such as@llvm.memcpy.)
  • An instruction with externally visible side effects depends on themost recent preceding instruction with externally visible sideeffects, following the order in the IR. (This includes volatileoperations.)
  • An instruction control-depends on a terminatorinstruction if the terminator instruction hasmultiple successors and the instruction is always executed whencontrol transfers to one of the successors, and may not be executedwhen control is transferred to another.
  • Additionally, an instruction also control-depends on a terminatorinstruction if the set of instructions it otherwise depends on wouldbe different if the terminator had transferred control to a differentsuccessor.
  • Dependence is transitive.
  • Vector elements may be independently poisoned. Therefore, transformson instructions such as shufflevector must be careful to propagatepoison across values or elements only as allowed by the original code.

An instruction that depends on a poison value, produces a poison valueitself. A poison value may be relaxed into anundef value, which takes an arbitrary bit-pattern.Propagation of poison can be stopped with thefreeze instruction.

This means that immediate undefined behavior occurs if a poison value isused as an instruction operand that has any values that trigger undefinedbehavior. Notably this includes (but is not limited to):

  • The pointer operand of a load, store orany other pointer dereferencing instruction (independent of addressspace).
  • The divisor operand of a udiv, sdiv, urem or sreminstruction.
  • The condition operand of a br instruction.
  • The callee operand of a call or invokeinstruction.

Here are some examples:

entry:
  %poison = sub nuw i32 0, 1           ; Results in a poison value.
  %still_poison = and i32 %poison, 0   ; 0, but also poison.
  %poison_yet_again = getelementptr i32, i32* @h, i32 %still_poison
  store i32 0, i32* %poison_yet_again  ; Undefined behavior due to
                                       ; store to poison.

  store i32 %poison, i32* @g           ; Poison value stored to memory.
  %poison2 = load i32, i32* @g         ; Poison value loaded back from memory.

  %narrowaddr = bitcast i32* @g to i16*
  %wideaddr = bitcast i32* @g to i64*
  %poison3 = load i16, i16* %narrowaddr ; Returns a poison value.
  %poison4 = load i64, i64* %wideaddr   ; Returns a poison value.

  %cmp = icmp slt i32 %poison, 0       ; Returns a poison value.
  br i1 %cmp, label %end, label %end   ; undefined behavior

end:

Addresses of Basic Blocks

blockaddress(@function, %block)

The ‘blockaddress’ constant computes the address of the specifiedbasic block in the specified function, and always has an i8* type.Taking the address of the entry block is illegal.

This value only has defined behavior when used as an operand to the‘indirectbr’ or ‘callbr’instruction, orfor comparisons against null. Pointer equality tests between labels addressesresults in undefined behavior — though, again, comparison against null is ok,and no label is equal to the null pointer. This may be passed around as anopaque pointer sized value as long as the bits are not inspected. Thisallows ptrtoint and arithmetic to be performed on these values solong as the original value is reconstituted before the indirectbr orcallbr instruction.

Finally, some targets may provide defined semantics when using the valueas the operand to an inline assembly, but that is target specific.

Constant Expressions

Constant expressions are used to allow expressions involving otherconstants to be used as constants. Constant expressions may be of anyfirst class type and may involve any LLVM operationthat does not have side effects (e.g. load and call are not supported).The following is the syntax for constant expressions:

  • trunc (CST to TYPE)
  • Perform the trunc operation on constants.
  • zext (CST to TYPE)
  • Perform the zext operation on constants.
  • sext (CST to TYPE)
  • Perform the sext operation on constants.
  • fptrunc (CST to TYPE)
  • Truncate a floating-point constant to another floating-point type.The size of CST must be larger than the size of TYPE. Both typesmust be floating-point.
  • fpext (CST to TYPE)
  • Floating-point extend a constant to another type. The size of CSTmust be smaller or equal to the size of TYPE. Both types must befloating-point.
  • fptoui (CST to TYPE)
  • Convert a floating-point constant to the corresponding unsignedinteger constant. TYPE must be a scalar or vector integer type. CSTmust be of scalar or vector floating-point type. Both CST and TYPEmust be scalars, or vectors of the same number of elements. If thevalue won’t fit in the integer type, the result is apoison value.
  • fptosi (CST to TYPE)
  • Convert a floating-point constant to the corresponding signedinteger constant. TYPE must be a scalar or vector integer type. CSTmust be of scalar or vector floating-point type. Both CST and TYPEmust be scalars, or vectors of the same number of elements. If thevalue won’t fit in the integer type, the result is apoison value.
  • uitofp (CST to TYPE)
  • Convert an unsigned integer constant to the correspondingfloating-point constant. TYPE must be a scalar or vector floating-pointtype. CST must be of scalar or vector integer type. Both CST and TYPE mustbe scalars, or vectors of the same number of elements.
  • sitofp (CST to TYPE)
  • Convert a signed integer constant to the corresponding floating-pointconstant. TYPE must be a scalar or vector floating-point type.CST must be of scalar or vector integer type. Both CST and TYPE mustbe scalars, or vectors of the same number of elements.
  • ptrtoint (CST to TYPE)
  • Perform the ptrtoint operation on constants.
  • inttoptr (CST to TYPE)
  • Perform the inttoptr operation on constants.This one is really dangerous!
  • bitcast (CST to TYPE)
  • Convert a constant, CST, to another TYPE.The constraints of the operands are the same as those for thebitcast instruction.
  • addrspacecast (CST to TYPE)
  • Convert a constant pointer or constant vector of pointer, CST, to anotherTYPE in a different address space. The constraints of the operands are thesame as those for the addrspacecast instruction.
  • getelementptr (TY, CSTPTR, IDX0, IDX1, …), getelementptr inbounds (TY, CSTPTR, IDX0, IDX1, …)
  • Perform the getelementptr operation onconstants. As with the getelementptrinstruction, the index list may have one or more indexes, which arerequired to make sense for the type of “pointer to TY”.
  • select (COND, VAL1, VAL2)
  • Perform the select operation on constants.
  • icmp COND (VAL1, VAL2)
  • Perform the icmp operation on constants.
  • fcmp COND (VAL1, VAL2)
  • Perform the fcmp operation on constants.
  • extractelement (VAL, IDX)
  • Perform the extractelement operation onconstants.
  • insertelement (VAL, ELT, IDX)
  • Perform the insertelement operation onconstants.
  • shufflevector (VEC1, VEC2, IDXMASK)
  • Perform the shufflevector operation onconstants.
  • extractvalue (VAL, IDX0, IDX1, …)
  • Perform the extractvalue operation onconstants. The index list is interpreted in a similar manner asindices in a ‘getelementptr’ operation. Atleast one index value must be specified.
  • insertvalue (VAL, ELT, IDX0, IDX1, …)
  • Perform the insertvalue operation on constants.The index list is interpreted in a similar manner as indices in a‘getelementptr’ operation. At least one indexvalue must be specified.
  • OPCODE (LHS, RHS)
  • Perform the specified operation of the LHS and RHS constants. OPCODEmay be any of the binary or bitwisebinary operations. The constraints on operands arethe same as those for the corresponding instruction (e.g. no bitwiseoperations on floating-point values are allowed).

Other Values

Inline Assembler Expressions

LLVM supports inline assembler expressions (as opposed to Module-LevelInline Assembly) through the use of a special value. This valuerepresents the inline assembler as a template string (containing theinstructions to emit), a list of operand constraints (stored as a string), aflag that indicates whether or not the inline asm expression has side effects,and a flag indicating whether the function containing the asm needs to align itsstack conservatively.

The template string supports argument substitution of the operands using “$”followed by a number, to indicate substitution of the given register/memorylocation, as specified by the constraint string. “${NUM:MODIFIER}” may alsobe used, where MODIFIER is a target-specific annotation for how to print theoperand (See Asm template argument modifiers).

A literal “$” may be included by using “$$” in the template. To includeother special characters into the output, the usual “\XX” escapes may beused, just as in other strings. Note that after template substitution, theresulting assembly string is parsed by LLVM’s integrated assembler unless it isdisabled – even when emitting a .s file – and thus must contain assemblysyntax known to LLVM.

LLVM also supports a few more substitutions useful for writing inline assembly:

  • ${:uid}: Expands to a decimal integer unique to this inline assembly blob.This substitution is useful when declaring a local label. Many standardcompiler optimizations, such as inlining, may duplicate an inline asm blob.Adding a blob-unique identifier ensures that the two labels will not conflictduring assembly. This is used to implement GCC’s %= special formatstring.
  • ${:comment}: Expands to the comment character of the current target’sassembly dialect. This is usually #, but many targets use other strings,such as ;, //, or !.
  • ${:private}: Expands to the assembler private label prefix. Labels withthis prefix will not appear in the symbol table of the assembled object.Typically the prefix is L, but targets may use other strings. .L isrelatively popular.

LLVM’s support for inline asm is modeled closely on the requirements of Clang’sGCC-compatible inline-asm support. Thus, the feature-set and the constraint andmodifier codes listed here are similar or identical to those in GCC’s inline asmsupport. However, to be clear, the syntax of the template and constraint stringsdescribed here is not the same as the syntax accepted by GCC and Clang, and,while most constraint letters are passed through as-is by Clang, some gettranslated to other codes when converting from the C source to the LLVMassembly.

An example inline assembler expression is:

i32 (i32) asm "bswap $0", "=r,r"

Inline assembler expressions may only be used as the callee operandof a call or an invoke instruction.Thus, typically we have:

%X = call i32 asm "bswap $0", "=r,r"(i32 %Y)

Inline asms with side effects not visible in the constraint list must bemarked as having side effects. This is done through the use of the‘sideeffect’ keyword, like so:

call void asm sideeffect "eieio", ""()

In some cases inline asms will contain code that will not work unlessthe stack is aligned in some way, such as calls or SSE instructions onx86, yet will not contain code that does that alignment within the asm.The compiler should make conservative assumptions about what the asmmight contain and should generate its usual stack alignment code in theprologue if the ‘alignstack’ keyword is present:

call void asm alignstack "eieio", ""()

Inline asms also support using non-standard assembly dialects. Theassumed dialect is ATT. When the ‘inteldialect’ keyword is present,the inline asm is using the Intel dialect. Currently, ATT and Intel arethe only supported dialects. An example is:

call void asm inteldialect "eieio", ""()

If multiple keywords appear the ‘sideeffect’ keyword must comefirst, the ‘alignstack’ keyword second and the ‘inteldialect’keyword last.

Inline Asm Constraint String

The constraint list is a comma-separated string, each element containing one ormore constraint codes.

For each element in the constraint list an appropriate register or memoryoperand will be chosen, and it will be made available to assembly templatestring expansion as $0 for the first constraint in the list, $1 for thesecond, etc.

There are three different types of constraints, which are distinguished by aprefix symbol in front of the constraint code: Output, Input, and Clobber. Theconstraints must always be given in that order: outputs first, then inputs, thenclobbers. They cannot be intermingled.

There are also three different categories of constraint codes:

  • Register constraint. This is either a register class, or a fixed physicalregister. This kind of constraint will allocate a register, and if necessary,bitcast the argument or result to the appropriate type.
  • Memory constraint. This kind of constraint is for use with an instructiontaking a memory operand. Different constraints allow for different addressingmodes used by the target.
  • Immediate value constraint. This kind of constraint is for an integer or otherimmediate value which can be rendered directly into an instruction. Thevarious target-specific constraints allow the selection of a value in theproper range for the instruction you wish to use it with.
Output constraints

Output constraints are specified by an “=” prefix (e.g. “=r”). Thisindicates that the assembly will write to this operand, and the operand willthen be made available as a return value of the asm expression. Outputconstraints do not consume an argument from the call instruction. (Except, seebelow about indirect outputs).

Normally, it is expected that no output locations are written to by the assemblyexpression until all of the inputs have been read. As such, LLVM may assignthe same register to an output and an input. If this is not safe (e.g. if theassembly contains two instructions, where the first writes to one output, andthe second reads an input and writes to a second output), then the “&”modifier must be used (e.g. “=&r”) to specify that the output is an“early-clobber” output. Marking an output as “early-clobber” ensures that LLVMwill not use the same register for any inputs (other than an input tied to thisoutput).

Input constraints

Input constraints do not have a prefix – just the constraint codes. Each inputconstraint will consume one argument from the call instruction. It is notpermitted for the asm to write to any input register or memory location (unlessthat input is tied to an output). Note also that multiple inputs may all beassigned to the same register, if LLVM can determine that they necessarily allcontain the same value.

Instead of providing a Constraint Code, input constraints may also “tie”themselves to an output constraint, by providing an integer as the constraintstring. Tied inputs still consume an argument from the call instruction, andtake up a position in the asm template numbering as is usual – they will simplybe constrained to always use the same register as the output they’ve been tiedto. For example, a constraint string of “=r,0” says to assign a register foroutput, and use that register as an input as well (it being the 0’thconstraint).

It is permitted to tie an input to an “early-clobber” output. In that case, noother input may share the same register as the input tied to the early-clobber(even when the other input has the same value).

You may only tie an input to an output which has a register constraint, not amemory constraint. Only a single input may be tied to an output.

There is also an “interesting” feature which deserves a bit of explanation: if aregister class constraint allocates a register which is too small for the valuetype operand provided as input, the input value will be split into multipleregisters, and all of them passed to the inline asm.

However, this feature is often not as useful as you might think.

Firstly, the registers are not guaranteed to be consecutive. So, on thosearchitectures that have instructions which operate on multiple consecutiveinstructions, this is not an appropriate way to support them. (e.g. the 32-bitSparcV8 has a 64-bit load, which instruction takes a single 32-bit register. Thehardware then loads into both the named register, and the next register. Thisfeature of inline asm would not be useful to support that.)

A few of the targets provide a template string modifier allowing explicit accessto the second register of a two-register operand (e.g. MIPS L, M, andD). On such an architecture, you can actually access the second allocatedregister (yet, still, not any subsequent ones). But, in that case, you’re stillprobably better off simply splitting the value into two separate operands, forclarity. (e.g. see the description of the A constraint on X86, which,despite existing only for use with this feature, is not really a good idea touse)

Indirect inputs and outputs

Indirect output or input constraints can be specified by the “*” modifier(which goes after the “=” in case of an output). This indicates that the asmwill write to or read from the contents of an address provided as an inputargument. (Note that in this way, indirect outputs act more like an input thanan output: just like an input, they consume an argument of the call expression,rather than producing a return value. An indirect output constraint is an“output” only in that the asm is expected to write to the contents of the inputmemory location, instead of just read from it).

This is most typically used for memory constraint, e.g. “=*m”, to pass theaddress of a variable as a value.

It is also possible to use an indirect register constraint, but only on output(e.g. “=*r”). This will cause LLVM to allocate a register for an outputvalue normally, and then, separately emit a store to the address provided asinput, after the provided inline asm. (It’s not clear what value thisfunctionality provides, compared to writing the store explicitly after the asmstatement, and it can only produce worse code, since it bypasses manyoptimization passes. I would recommend not using it.)

Clobber constraints

A clobber constraint is indicated by a “~” prefix. A clobber does notconsume an input operand, nor generate an output. Clobbers cannot use any of thegeneral constraint code letters – they may use only explicit registerconstraints, e.g. “~{eax}”. The one exception is that a clobber string of“~{memory}” indicates that the assembly writes to arbitrary undeclaredmemory locations – not only the memory pointed to by a declared indirectoutput.

Note that clobbering named registers that are also present in outputconstraints is not legal.

Constraint Codes

After a potential prefix comes constraint code, or codes.

A Constraint Code is either a single letter (e.g. “r”), a “^” characterfollowed by two letters (e.g. “^wc”), or “{” register-name “}”(e.g. “{eax}”).

The one and two letter constraint codes are typically chosen to be the same asGCC’s constraint codes.

A single constraint may include one or more than constraint code in it, leavingit up to LLVM to choose which one to use. This is included mainly forcompatibility with the translation of GCC inline asm coming from clang.

There are two ways to specify alternatives, and either or both may be used in aninline asm constraint list:

  • Append the codes to each other, making a constraint code set. E.g. “im”or “{eax}m”. This means “choose any of the options in the set”. Thechoice of constraint is made independently for each constraint in theconstraint list.
  • Use “|” between constraint code sets, creating alternatives. Everyconstraint in the constraint list must have the same number of alternativesets. With this syntax, the same alternative in all of the items in theconstraint list will be chosen together.Putting those together, you might have a two operand constraint string like"rm|r,ri|rm". This indicates that if operand 0 is r or m, thenoperand 1 may be one of r or i. If operand 0 is r, then operand 1may be one of r or m. But, operand 0 and 1 cannot both be of type m.

However, the use of either of the alternatives features is NOT recommended, asLLVM is not able to make an intelligent choice about which one to use. (At thepoint it currently needs to choose, not enough information is available to do soin a smart way.) Thus, it simply tries to make a choice that’s most likely tocompile, not one that will be optimal performance. (e.g., given “rm”, it’llalways choose to use memory, not registers). And, if given multiple registers,or multiple register classes, it will simply choose the first one. (In fact, itdoesn’t currently even ensure explicitly specified physical registers areunique, so specifying multiple physical registers as alternatives, like{r11}{r12},{r11}{r12}, will assign r11 to both operands, not at all what wasintended.)

Supported Constraint Code List

The constraint codes are, in general, expected to behave the same way they do inGCC. LLVM’s support is often implemented on an ‘as-needed’ basis, to support Cinline asm code which was supported by GCC. A mismatch in behavior between LLVMand GCC likely indicates a bug in LLVM.

Some constraint codes are typically supported by all targets:

  • r: A register in the target’s general purpose register class.
  • m: A memory address operand. It is target-specific what addressing modesare supported, typical examples are register, or register + register offset,or register + immediate offset (of some target-specific size).
  • i: An integer constant (of target-specific width). Allows either a simpleimmediate, or a relocatable value.
  • n: An integer constant – not including relocatable values.
  • s: An integer constant, but allowing only relocatable values.
  • X: Allows an operand of any kind, no constraint whatsoever. Typicallyuseful to pass a label for an asm branch or call.
  • {register-name}: Requires exactly the named physical register.

Other constraints are target-specific:

AArch64:

  • z: An immediate integer 0. Outputs WZR or XZR, as appropriate.
  • I: An immediate integer valid for an ADD or SUB instruction,i.e. 0 to 4095 with optional shift by 12.
  • J: An immediate integer that, when negated, is valid for an ADD orSUB instruction, i.e. -1 to -4095 with optional left shift by 12.
  • K: An immediate integer that is valid for the ‘bitmask immediate 32’ of alogical instruction like AND, EOR, or ORR with a 32-bit register.
  • L: An immediate integer that is valid for the ‘bitmask immediate 64’ of alogical instruction like AND, EOR, or ORR with a 64-bit register.
  • M: An immediate integer for use with the MOV assembly alias on a32-bit register. This is a superset of K: in addition to the bitmaskimmediate, also allows immediate integers which can be loaded with a singleMOVZ or MOVL instruction.
  • N: An immediate integer for use with the MOV assembly alias on a64-bit register. This is a superset of L.
  • Q: Memory address operand must be in a single register (nooffsets). (However, LLVM currently does this for the m constraint aswell.)
  • r: A 32 or 64-bit integer register (W or X).
  • w: A 32, 64, or 128-bit floating-point, SIMD or SVE vector register.
  • x: Like w, but restricted to registers 0 to 15 inclusive.
  • y: Like w, but restricted to SVE vector registers Z0 to Z7 inclusive.
  • Upl: One of the low eight SVE predicate registers (P0 to P7)
  • Upa: Any of the SVE predicate registers (P0 to P15)

AMDGPU:

  • r: A 32 or 64-bit integer register.
  • [0-9]v: The 32-bit VGPR register, number 0-9.
  • [0-9]s: The 32-bit SGPR register, number 0-9.

All ARM modes:

  • Q, Um, Un, Uq, Us, Ut, Uv, Uy: Memory addressoperand. Treated the same as operand m, at the moment.
  • Te: An even general-purpose 32-bit integer register: r0,r2,…,r12,r14
  • To: An odd general-purpose 32-bit integer register: r1,r3,…,r11

ARM and ARM’s Thumb2 mode:

  • j: An immediate integer between 0 and 65535 (valid for MOVW)
  • I: An immediate integer valid for a data-processing instruction.
  • J: An immediate integer between -4095 and 4095.
  • K: An immediate integer whose bitwise inverse is valid for adata-processing instruction. (Can be used with template modifier “B” toprint the inverted value).
  • L: An immediate integer whose negation is valid for a data-processinginstruction. (Can be used with template modifier “n” to print the negatedvalue).
  • M: A power of two or a integer between 0 and 32.
  • N: Invalid immediate constraint.
  • O: Invalid immediate constraint.
  • r: A general-purpose 32-bit integer register (r0-r15).
  • l: In Thumb2 mode, low 32-bit GPR registers (r0-r7). In ARM mode, sameas r.
  • h: In Thumb2 mode, a high 32-bit GPR register (r8-r15). In ARM mode,invalid.
  • w: A 32, 64, or 128-bit floating-point/SIMD register in the rangess0-s31, d0-d31, or q0-q15, respectively.
  • t: A 32, 64, or 128-bit floating-point/SIMD register in the rangess0-s31, d0-d15, or q0-q7, respectively.
  • x: A 32, 64, or 128-bit floating-point/SIMD register in the rangess0-s15, d0-d7, or q0-q3, respectively.

ARM’s Thumb1 mode:

  • I: An immediate integer between 0 and 255.
  • J: An immediate integer between -255 and -1.
  • K: An immediate integer between 0 and 255, with optional left-shift bysome amount.
  • L: An immediate integer between -7 and 7.
  • M: An immediate integer which is a multiple of 4 between 0 and 1020.
  • N: An immediate integer between 0 and 31.
  • O: An immediate integer which is a multiple of 4 between -508 and 508.
  • r: A low 32-bit GPR register (r0-r7).
  • l: A low 32-bit GPR register (r0-r7).
  • h: A high GPR register (r0-r7).
  • w: A 32, 64, or 128-bit floating-point/SIMD register in the rangess0-s31, d0-d31, or q0-q15, respectively.
  • t: A 32, 64, or 128-bit floating-point/SIMD register in the rangess0-s31, d0-d15, or q0-q7, respectively.
  • x: A 32, 64, or 128-bit floating-point/SIMD register in the rangess0-s15, d0-d7, or q0-q3, respectively.

Hexagon:

  • o, v: A memory address operand, treated the same as constraint m,at the moment.
  • r: A 32 or 64-bit register.

MSP430:

  • r: An 8 or 16-bit register.

MIPS:

  • I: An immediate signed 16-bit integer.
  • J: An immediate integer zero.
  • K: An immediate unsigned 16-bit integer.
  • L: An immediate 32-bit integer, where the lower 16 bits are 0.
  • N: An immediate integer between -65535 and -1.
  • O: An immediate signed 15-bit integer.
  • P: An immediate integer between 1 and 65535.
  • m: A memory address operand. In MIPS-SE mode, allows a base addressregister plus 16-bit immediate offset. In MIPS mode, just a base register.
  • R: A memory address operand. In MIPS-SE mode, allows a base addressregister plus a 9-bit signed offset. In MIPS mode, the same as constraintm.
  • ZC: A memory address operand, suitable for use in a pref, ll, orsc instruction on the given subtarget (details vary).
  • r, d, y: A 32 or 64-bit GPR register.
  • f: A 32 or 64-bit FPU register (F0-F31), or a 128-bit MSA register(W0-W31). In the case of MSA registers, it is recommended to use the wargument modifier for compatibility with GCC.
  • c: A 32-bit or 64-bit GPR register suitable for indirect jump (always25).
  • l: The lo register, 32 or 64-bit.
  • x: Invalid.

NVPTX:

  • b: A 1-bit integer register.
  • c or h: A 16-bit integer register.
  • r: A 32-bit integer register.
  • l or N: A 64-bit integer register.
  • f: A 32-bit float register.
  • d: A 64-bit float register.

PowerPC:

  • I: An immediate signed 16-bit integer.
  • J: An immediate unsigned 16-bit integer, shifted left 16 bits.
  • K: An immediate unsigned 16-bit integer.
  • L: An immediate signed 16-bit integer, shifted left 16 bits.
  • M: An immediate integer greater than 31.
  • N: An immediate integer that is an exact power of 2.
  • O: The immediate integer constant 0.
  • P: An immediate integer constant whose negation is a signed 16-bitconstant.
  • es, o, Q, Z, Zy: A memory address operand, currentlytreated the same as m.
  • r: A 32 or 64-bit integer register.
  • b: A 32 or 64-bit integer register, excluding R0 (that is:R1-R31).
  • f: A 32 or 64-bit float register (F0-F31), or when QPX is enabled, a128 or 256-bit QPX register (Q0-Q31; aliases the F registers).
  • v: For 4 x f32 or 4 x f64 types, when QPX is enabled, a128 or 256-bit QPX register (Q0-Q31), otherwise a 128-bitaltivec vector register (V0-V31).
  • y: Condition register (CR0-CR7).
  • wc: An individual CR bit in a CR register.
  • wa, wd, wf: Any 128-bit VSX vector register, from the full VSXregister set (overlapping both the floating-point and vector register files).
  • ws: A 32 or 64-bit floating-point register, from the full VSX registerset.

RISC-V:

  • A: An address operand (using a general-purpose register, without anoffset).
  • I: A 12-bit signed integer immediate operand.
  • J: A zero integer immediate operand.
  • K: A 5-bit unsigned integer immediate operand.
  • f: A 32- or 64-bit floating-point register (requires F or D extension).
  • r: A 32- or 64-bit general-purpose register (depending on the platformXLEN).

Sparc:

  • I: An immediate 13-bit signed integer.
  • r: A 32-bit integer register.
  • f: Any floating-point register on SparcV8, or a floating-pointregister in the “low” half of the registers on SparcV9.
  • e: Any floating-point register. (Same as f on SparcV8.)

SystemZ:

  • I: An immediate unsigned 8-bit integer.
  • J: An immediate unsigned 12-bit integer.
  • K: An immediate signed 16-bit integer.
  • L: An immediate signed 20-bit integer.
  • M: An immediate integer 0x7fffffff.
  • Q: A memory address operand with a base address and a 12-bit immediateunsigned displacement.
  • R: A memory address operand with a base address, a 12-bit immediateunsigned displacement, and an index register.
  • S: A memory address operand with a base address and a 20-bit immediatesigned displacement.
  • T: A memory address operand with a base address, a 20-bit immediatesigned displacement, and an index register.
  • r or d: A 32, 64, or 128-bit integer register.
  • a: A 32, 64, or 128-bit integer address register (excludes R0, which in anaddress context evaluates as zero).
  • h: A 32-bit value in the high part of a 64bit data register(LLVM-specific)
  • f: A 32, 64, or 128-bit floating-point register.

X86:

  • I: An immediate integer between 0 and 31.
  • J: An immediate integer between 0 and 64.
  • K: An immediate signed 8-bit integer.
  • L: An immediate integer, 0xff or 0xffff or (in 64-bit mode only)0xffffffff.
  • M: An immediate integer between 0 and 3.
  • N: An immediate unsigned 8-bit integer.
  • O: An immediate integer between 0 and 127.
  • e: An immediate 32-bit signed integer.
  • Z: An immediate 32-bit unsigned integer.
  • o, v: Treated the same as m, at the moment.
  • q: An 8, 16, 32, or 64-bit register which can be accessed as an 8-bitl integer register. On X86-32, this is the a, b, c, and dregisters, and on X86-64, it is all of the integer registers.
  • Q: An 8, 16, 32, or 64-bit register which can be accessed as an 8-bith integer register. This is the a, b, c, and d registers.
  • r or l: An 8, 16, 32, or 64-bit integer register.
  • R: An 8, 16, 32, or 64-bit “legacy” integer register – one which hasexisted since i386, and can be accessed without the REX prefix.
  • f: A 32, 64, or 80-bit ‘387 FPU stack pseudo-register.
  • y: A 64-bit MMX register, if MMX is enabled.
  • x: If SSE is enabled: a 32 or 64-bit scalar operand, or 128-bit vectoroperand in a SSE register. If AVX is also enabled, can also be a 256-bitvector operand in an AVX register. If AVX-512 is also enabled, can also be a512-bit vector operand in an AVX512 register, Otherwise, an error.
  • Y: The same as x, if SSE2 is enabled, otherwise an error.
  • A: Special case: allocates EAX first, then EDX, for a single operand (in32-bit mode, a 64-bit integer operand will get split into two registers). Itis not recommended to use this constraint, as in 64-bit mode, the 64-bitoperand will get allocated only to RAX – if two 32-bit operands are needed,you’re better off splitting it yourself, before passing it to the asmstatement.

XCore:

  • r: A 32-bit integer register.

Asm template argument modifiers

In the asm template string, modifiers can be used on the operand reference, like“${0:n}”.

The modifiers are, in general, expected to behave the same way they do inGCC. LLVM’s support is often implemented on an ‘as-needed’ basis, to support Cinline asm code which was supported by GCC. A mismatch in behavior between LLVMand GCC likely indicates a bug in LLVM.

Target-independent:

  • c: Print an immediate integer constant unadorned, withoutthe target-specific immediate punctuation (e.g. no $ prefix).
  • n: Negate and print immediate integer constant unadorned, without thetarget-specific immediate punctuation (e.g. no $ prefix).
  • l: Print as an unadorned label, without the target-specific labelpunctuation (e.g. no $ prefix).

AArch64:

  • w: Print a GPR register with a w name instead of x name. E.g.,instead of x30, print w30.
  • x: Print a GPR register with a x* name. (this is the default, anyhow).
  • b, h, s, d, q: Print a floating-point/SIMD register with ab, h, s, d, or q name, rather than the default ofv.

AMDGPU:

  • r: No effect.

ARM:

  • a: Print an operand as an address (with [ and ] surrounding aregister).
  • P: No effect.
  • q: No effect.
  • y: Print a VFP single-precision register as an indexed double (e.g. printas d4[1] instead of s9)
  • B: Bitwise invert and print an immediate integer constant without #prefix.
  • L: Print the low 16-bits of an immediate integer constant.
  • M: Print as a register set suitable for ldm/stm. Also prints _all_register operands subsequent to the specified one (!), so use carefully.
  • Q: Print the low-order register of a register-pair, or the low-orderregister of a two-register operand.
  • R: Print the high-order register of a register-pair, or the high-orderregister of a two-register operand.
  • H: Print the second register of a register-pair. (On a big-endian system,H is equivalent to Q, and on little-endian system, H is equivalentto R.)
  • e: Print the low doubleword register of a NEON quad register.
  • f: Print the high doubleword register of a NEON quad register.
  • m: Print the base register of a memory operand without the [ and ]adornment.

Hexagon:

  • L: Print the second register of a two-register operand. Requires that ithas been allocated consecutively to the first.
  • I: Print the letter ‘i’ if the operand is an integer constant, otherwisenothing. Used to print ‘addi’ vs ‘add’ instructions.

MSP430:

No additional modifiers.

MIPS:

  • X: Print an immediate integer as hexadecimal
  • x: Print the low 16 bits of an immediate integer as hexadecimal.
  • d: Print an immediate integer as decimal.
  • m: Subtract one and print an immediate integer as decimal.
  • z: Print $0 if an immediate zero, otherwise print normally.
  • L: Print the low-order register of a two-register operand, or prints theaddress of the low-order word of a double-word memory operand.
  • M: Print the high-order register of a two-register operand, or prints theaddress of the high-order word of a double-word memory operand.
  • D: Print the second register of a two-register operand, or prints thesecond word of a double-word memory operand. (On a big-endian system, D isequivalent to L, and on little-endian system, D is equivalent toM.)
  • w: No effect. Provided for compatibility with GCC which requires thismodifier in order to print MSA registers (W0-W31) with the fconstraint.

NVPTX:

  • r: No effect.

PowerPC:

  • L: Print the second register of a two-register operand. Requires that ithas been allocated consecutively to the first.
  • I: Print the letter ‘i’ if the operand is an integer constant, otherwisenothing. Used to print ‘addi’ vs ‘add’ instructions.
  • y: For a memory operand, prints formatter for a two-register X-forminstruction. (Currently always prints r0,OPERAND).
  • U: Prints ‘u’ if the memory operand is an update form, and nothingotherwise. (NOTE: LLVM does not support update form, so this will currentlyalways print nothing)
  • X: Prints ‘x’ if the memory operand is an indexed form. (NOTE: LLVM doesnot support indexed form, so this will currently always print nothing)

RISC-V:

  • i: Print the letter ‘i’ if the operand is not a register, otherwise printnothing. Used to print ‘addi’ vs ‘add’ instructions, etc.
  • z: Print the register zero if an immediate zero, otherwise printnormally.

Sparc:

  • r: No effect.

SystemZ:

SystemZ implements only n, and does not support any of the othertarget-independent modifiers.

X86:

  • c: Print an unadorned integer or symbol name. (The latter istarget-specific behavior for this typically target-independent modifier).
  • A: Print a register name with a ‘*’ before it.
  • b: Print an 8-bit register name (e.g. al); do nothing on a memoryoperand.
  • h: Print the upper 8-bit register name (e.g. ah); do nothing on amemory operand.
  • w: Print the 16-bit register name (e.g. ax); do nothing on a memoryoperand.
  • k: Print the 32-bit register name (e.g. eax); do nothing on a memoryoperand.
  • q: Print the 64-bit register name (e.g. rax), if 64-bit registers areavailable, otherwise the 32-bit register name; do nothing on a memory operand.
  • n: Negate and print an unadorned integer, or, for operands other than animmediate integer (e.g. a relocatable symbol expression), print a ‘-‘ beforethe operand. (The behavior for relocatable symbol expressions is atarget-specific behavior for this typically target-independent modifier)
  • H: Print a memory reference with additional offset +8.
  • P: Print a memory reference or operand for use as the argument of a callinstruction. (E.g. omit (rip), even though it’s PC-relative.)

XCore:

No additional modifiers.

Inline Asm Metadata

The call instructions that wrap inline asm nodes may have a“!srcloc” MDNode attached to it that contains a list of constantintegers. If present, the code generator will use the integer as thelocation cookie value when report errors through the LLVMContexterror reporting mechanisms. This allows a front-end to correlate backenderrors that occur with inline asm back to the source code that producedit. For example:

call void asm sideeffect "something bad", ""(), !srcloc !42
...
!42 = !{ i32 1234567 }

It is up to the front-end to make sense of the magic numbers it placesin the IR. If the MDNode contains multiple constants, the code generatorwill use the one that corresponds to the line of the asm that the erroroccurs on.

Metadata

LLVM IR allows metadata to be attached to instructions in the programthat can convey extra information about the code to the optimizers andcode generator. One example application of metadata is source-leveldebug information. There are two metadata primitives: strings and nodes.

Metadata does not have a type, and is not a value. If referenced from acall instruction, it uses the metadata type.

All metadata are identified in syntax by a exclamation point (‘!’).

Metadata Nodes and Metadata Strings

A metadata string is a string surrounded by double quotes. It cancontain any character by escaping non-printable characters with“\xx” where “xx” is the two digit hex code. For example:“!"test\00"”.

Metadata nodes are represented with notation similar to structureconstants (a comma separated list of elements, surrounded by braces andpreceded by an exclamation point). Metadata nodes can have any values astheir operand. For example:

!{ !"test\00", i32 10}

Metadata nodes that aren’t uniqued use the distinct keyword. For example:

!0 = distinct !{!"test\00", i32 10}

distinct nodes are useful when nodes shouldn’t be merged based on theircontent. They can also occur when transformations cause uniquing collisionswhen metadata operands change.

A named metadata is a collection ofmetadata nodes, which can be looked up in the module symbol table. Forexample:

!foo = !{!4, !3}

Metadata can be used as function arguments. Here the llvm.dbg.valueintrinsic is using three metadata arguments:

call void @llvm.dbg.value(metadata !24, metadata !25, metadata !26)

Metadata can be attached to an instruction. Here metadata !21 is attachedto the add instruction using the !dbg identifier:

%indvar.next = add i64 %indvar, 1, !dbg !21

Metadata can also be attached to a function or a global variable. Here metadata!22 is attached to the f1 and f2 functions, and the globals ``g1and g2 using the !dbg identifier:

declare !dbg !22 void @f1()
define void @f2() !dbg !22 {
  ret void
}

@g1 = global i32 0, !dbg !22
@g2 = external global i32, !dbg !22

A transformation is required to drop any metadata attachment that it does notknow or know it can’t preserve. Currently there is an exception for metadataattachment to globals for !type and !absolute_symbol which can’t beunconditionally dropped unless the global is itself deleted.

Metadata attached to a module using named metadata may not be dropped, withthe exception of debug metadata (named metadata with the name !llvm.dbg.*).

More information about specific metadata nodes recognized by theoptimizers and code generator is found below.

Specialized Metadata Nodes

Specialized metadata nodes are custom data structures in metadata (as opposedto generic tuples). Their fields are labelled, and can be specified in anyorder.

These aren’t inherently debug info centric, but currently all the specializedmetadata nodes are related to debug info.

DICompileUnit

DICompileUnit nodes represent a compile unit. The enums:,retainedTypes:, globals:, imports: and macros: fields are tuplescontaining the debug info to be emitted along with the compile unit, regardlessof code optimizations (some nodes are only emitted if there are references tothem from instructions). The debugInfoForProfiling: field is a booleanindicating whether or not line-table discriminators are updated to providemore-accurate debug info for profiling results.

!0 = !DICompileUnit(language: DW_LANG_C99, file: !1, producer: "clang",
                    isOptimized: true, flags: "-O2", runtimeVersion: 2,
                    splitDebugFilename: "abc.debug", emissionKind: FullDebug,
                    enums: !2, retainedTypes: !3, globals: !4, imports: !5,
                    macros: !6, dwoId: 0x0abcd)

Compile unit descriptors provide the root scope for objects declared in aspecific compilation unit. File descriptors are defined using this scope. Thesedescriptors are collected by a named metadata node !llvm.dbg.cu. They keeptrack of global variables, type information, and imported entities (declarationsand namespaces).

DIFile

DIFile nodes represent files. The filename: can include slashes.

!0 = !DIFile(filename: "path/to/file", directory: "/path/to/dir",
             checksumkind: CSK_MD5,
             checksum: "000102030405060708090a0b0c0d0e0f")

Files are sometimes used in scope: fields, and are the only valid targetfor file: fields.Valid values for checksumkind: field are: {CSK_None, CSK_MD5, CSK_SHA1, CSK_SHA256}

DIBasicType

DIBasicType nodes represent primitive types, such as int, bool andfloat. tag: defaults to DW_TAG_base_type.

!0 = !DIBasicType(name: "unsigned char", size: 8, align: 8,
                  encoding: DW_ATE_unsigned_char)
!1 = !DIBasicType(tag: DW_TAG_unspecified_type, name: "decltype(nullptr)")

The encoding: describes the details of the type. Usually it’s one of thefollowing:

DW_ATE_address       = 1
DW_ATE_boolean       = 2
DW_ATE_float         = 4
DW_ATE_signed        = 5
DW_ATE_signed_char   = 6
DW_ATE_unsigned      = 7
DW_ATE_unsigned_char = 8
DISubroutineType

DISubroutineType nodes represent subroutine types. Their types: fieldrefers to a tuple; the first operand is the return type, while the rest are thetypes of the formal arguments in order. If the first operand is null, thatrepresents a function with no return value (such as void foo() {} in C++).

!0 = !BasicType(name: "int", size: 32, align: 32, DW_ATE_signed)
!1 = !BasicType(name: "char", size: 8, align: 8, DW_ATE_signed_char)
!2 = !DISubroutineType(types: !{null, !0, !1}) ; void (int, char)
DIDerivedType

DIDerivedType nodes represent types derived from other types, such asqualified types.

!0 = !DIBasicType(name: "unsigned char", size: 8, align: 8,
                  encoding: DW_ATE_unsigned_char)
!1 = !DIDerivedType(tag: DW_TAG_pointer_type, baseType: !0, size: 32,
                    align: 32)

The following tag: values are valid:

DW_TAG_member             = 13
DW_TAG_pointer_type       = 15
DW_TAG_reference_type     = 16
DW_TAG_typedef            = 22
DW_TAG_inheritance        = 28
DW_TAG_ptr_to_member_type = 31
DW_TAG_const_type         = 38
DW_TAG_friend             = 42
DW_TAG_volatile_type      = 53
DW_TAG_restrict_type      = 55
DW_TAG_atomic_type        = 71

DW_TAG_member is used to define a member of a composite type. The type of the member is the baseType:. Theoffset: is the member’s bit offset. If the composite type has an ODRidentifier: and does not set flags: DIFwdDecl, then the member isuniqued based only on its name: and scope:.

DW_TAG_inheritance and DW_TAG_friend are used in the elements:field of composite types to describe parents andfriends.

DW_TAG_typedef is used to provide a name for the baseType:.

DW_TAG_pointer_type, DW_TAG_reference_type, DW_TAG_const_type,DW_TAG_volatile_type, DW_TAG_restrict_type and DW_TAG_atomic_typeare used to qualify the baseType:.

Note that the void * type is expressed as a type derived from NULL.

DICompositeType

DICompositeType nodes represent types composed of other types, likestructures and unions. elements: points to a tuple of the composed types.

If the source language supports ODR, the identifier: field gives the uniqueidentifier used for type merging between modules. When specified,subprogram declarations and memberderived types that reference the ODR-type in theirscope: change uniquing rules.

For a given identifier:, there should only be a single composite type thatdoes not have flags: DIFlagFwdDecl set. LLVM tools that link modulestogether will unique such definitions at parse time via the identifier:field, even if the nodes are distinct.

!0 = !DIEnumerator(name: "SixKind", value: 7)
!1 = !DIEnumerator(name: "SevenKind", value: 7)
!2 = !DIEnumerator(name: "NegEightKind", value: -8)
!3 = !DICompositeType(tag: DW_TAG_enumeration_type, name: "Enum", file: !12,
                      line: 2, size: 32, align: 32, identifier: "_M4Enum",
                      elements: !{!0, !1, !2})

The following tag: values are valid:

DW_TAG_array_type       = 1
DW_TAG_class_type       = 2
DW_TAG_enumeration_type = 4
DW_TAG_structure_type   = 19
DW_TAG_union_type       = 23

For DW_TAG_array_type, the elements: should be subrangedescriptors, each representing the range of subscripts at thatlevel of indexing. The DIFlagVector flag to flags: indicates that anarray type is a native packed vector.

For DW_TAG_enumeration_type, the elements: should be enumeratordescriptors, each representing the definition of an enumerationvalue for the set. All enumeration type descriptors are collected in theenums: field of the compile unit.

For DW_TAG_structure_type, DW_TAG_class_type, andDW_TAG_union_type, the elements: should be derived types with tag: DW_TAG_member, tag: DW_TAG_inheritance, ortag: DW_TAG_friend; or subprograms withisDefinition: false.

DISubrange

DISubrange nodes are the elements for DW_TAG_array_type variants ofDICompositeType.

!0 = !DISubrange(count: 5, lowerBound: 0) ; array counting from 0
!1 = !DISubrange(count: 5, lowerBound: 1) ; array counting from 1
!2 = !DISubrange(count: -1) ; empty array.

; Scopes used in rest of example
!6 = !DIFile(filename: "vla.c", directory: "/path/to/file")
!7 = distinct !DICompileUnit(language: DW_LANG_C99, file: !6)
!8 = distinct !DISubprogram(name: "foo", scope: !7, file: !6, line: 5)

; Use of local variable as count value
!9 = !DIBasicType(name: "int", size: 32, encoding: DW_ATE_signed)
!10 = !DILocalVariable(name: "count", scope: !8, file: !6, line: 42, type: !9)
!11 = !DISubrange(count: !10, lowerBound: 0)

; Use of global variable as count value
!12 = !DIGlobalVariable(name: "count", scope: !8, file: !6, line: 22, type: !9)
!13 = !DISubrange(count: !12, lowerBound: 0)
DIEnumerator

DIEnumerator nodes are the elements for DW_TAG_enumeration_typevariants of DICompositeType.

!0 = !DIEnumerator(name: "SixKind", value: 7)
!1 = !DIEnumerator(name: "SevenKind", value: 7)
!2 = !DIEnumerator(name: "NegEightKind", value: -8)
DITemplateTypeParameter

DITemplateTypeParameter nodes represent type parameters to generic sourcelanguage constructs. They are used (optionally) in DICompositeType andDISubprogram templateParams: fields.

!0 = !DITemplateTypeParameter(name: "Ty", type: !1)
DITemplateValueParameter

DITemplateValueParameter nodes represent value parameters to generic sourcelanguage constructs. tag: defaults to DW_TAG_template_value_parameter,but if specified can also be set to DW_TAG_GNU_template_template_param orDW_TAG_GNU_template_param_pack. They are used (optionally) inDICompositeType and DISubprogram templateParams: fields.

!0 = !DITemplateValueParameter(name: "Ty", type: !1, value: i32 7)
DINamespace

DINamespace nodes represent namespaces in the source language.

!0 = !DINamespace(name: "myawesomeproject", scope: !1, file: !2, line: 7)
DIGlobalVariable

DIGlobalVariable nodes represent global variables in the source language.

@foo = global i32, !dbg !0!0 = !DIGlobalVariableExpression(var: !1, expr: !DIExpression())!1 = !DIGlobalVariable(name: "foo", linkageName: "foo", scope: !2,                       file: !3, line: 7, type: !4, isLocal: true,                       isDefinition: false, declaration: !5)

DIGlobalVariableExpression

DIGlobalVariableExpression nodes tie a DIGlobalVariable togetherwith a DIExpression.

@lower = global i32, !dbg !0@upper = global i32, !dbg !1!0 = !DIGlobalVariableExpression(         var: !2,         expr: !DIExpression(DW_OP_LLVM_fragment, 0, 32)         )!1 = !DIGlobalVariableExpression(         var: !2,         expr: !DIExpression(DW_OP_LLVM_fragment, 32, 32)         )!2 = !DIGlobalVariable(name: "split64", linkageName: "split64", scope: !3,                       file: !4, line: 8, type: !5, declaration: !6)

All global variable expressions should be referenced by the globals: field ofa compile unit.

DISubprogram

DISubprogram nodes represent functions from the source language. Adistinct DISubprogram may be attached to a function definition using!dbg metadata. A unique DISubprogram may be attached to a functiondeclaration used for call site debug info. The variables: field points atvariables that must be retained, even if their IRcounterparts are optimized out of the IR. The type: field must point at anDISubroutineType.

When isDefinition: false, subprograms describe a declaration in the typetree as opposed to a definition of a function. If the scope is a compositetype with an ODR identifier: and that does not set flags: DIFwdDecl,then the subprogram declaration is uniqued based only on its linkageName:and scope:.

define void @_Z3foov() !dbg !0 {
  ...
}

!0 = distinct !DISubprogram(name: "foo", linkageName: "_Zfoov", scope: !1,
                            file: !2, line: 7, type: !3, isLocal: true,
                            isDefinition: true, scopeLine: 8,
                            containingType: !4,
                            virtuality: DW_VIRTUALITY_pure_virtual,
                            virtualIndex: 10, flags: DIFlagPrototyped,
                            isOptimized: true, unit: !5, templateParams: !6,
                            declaration: !7, variables: !8, thrownTypes: !9)
DILexicalBlock

DILexicalBlock nodes describe nested blocks within a subprogram. The line number and column numbers are used to distinguishtwo lexical blocks at same depth. They are valid targets for scope:fields.

!0 = distinct !DILexicalBlock(scope: !1, file: !2, line: 7, column: 35)

Usually lexical blocks are distinct to prevent node merging based onoperands.

DILexicalBlockFile

DILexicalBlockFile nodes are used to discriminate between sections of alexical block. The file: field can be changed toindicate textual inclusion, or the discriminator: field can be used todiscriminate between control flow within a single block in the source language.

!0 = !DILexicalBlock(scope: !3, file: !4, line: 7, column: 35)
!1 = !DILexicalBlockFile(scope: !0, file: !4, discriminator: 0)
!2 = !DILexicalBlockFile(scope: !0, file: !4, discriminator: 1)
DILocation

DILocation nodes represent source debug locations. The scope: field ismandatory, and points at an DILexicalBlockFile, anDILexicalBlock, or an DISubprogram.

!0 = !DILocation(line: 2900, column: 42, scope: !1, inlinedAt: !2)
DILocalVariable

DILocalVariable nodes represent local variables in the source language. Ifthe arg: field is set to non-zero, then this variable is a subprogramparameter, and it will be included in the variables: field of itsDISubprogram.

!0 = !DILocalVariable(name: "this", arg: 1, scope: !3, file: !2, line: 7,
                      type: !3, flags: DIFlagArtificial)
!1 = !DILocalVariable(name: "x", arg: 2, scope: !4, file: !2, line: 7,
                      type: !3)
!2 = !DILocalVariable(name: "y", scope: !5, file: !2, line: 7, type: !3)
DIExpression

DIExpression nodes represent expressions that are inspired by the DWARFexpression language. They are used in debug intrinsics(such as llvm.dbg.declare and llvm.dbg.value) to describe how thereferenced LLVM variable relates to the source language variable. Debugintrinsics are interpreted left-to-right: start by pushing the value/addressoperand of the intrinsic onto a stack, then repeatedly push and evaluateopcodes from the DIExpression until the final variable description is produced.

The current supported opcode vocabulary is limited:

  • DW_OP_deref dereferences the top of the expression stack.

  • DW_OP_plus pops the last two entries from the expression stack, addsthem together and appends the result to the expression stack.

  • DW_OP_minus pops the last two entries from the expression stack, subtractsthe last entry from the second last entry and appends the result to theexpression stack.

  • DW_OP_plus_uconst, 93 adds 93 to the working expression.

  • DW_OP_LLVM_fragment, 16, 8 specifies the offset and size (16 and 8here, respectively) of the variable fragment from the working expression. Notethat contrary to DW_OP_bit_piece, the offset is describing the locationwithin the described source variable.

  • DW_OP_LLVM_convert, 16, DW_ATE_signed specifies a bit size and encoding(16 and DW_ATE_signed here, respectively) to which the top of theexpression stack is to be converted. Maps into a DW_OP_convert operationthat references a base type constructed from the supplied values.

  • DW_OP_LLVM_tag_offset, tag_offset specifies that a memory tag should beoptionally applied to the pointer. The memory tag is derived from thegiven tag offset in an implementation-defined manner.

  • DW_OP_swap swaps top two stack entries.

  • DW_OP_xderef provides extended dereference mechanism. The entry at the topof the stack is treated as an address. The second stack entry is treated as anaddress space identifier.

  • DW_OP_stack_value marks a constant value.

  • DW_OP_LLVM_entry_value, N can only appear at the beginning of aDIExpression, and it specifies that all register and memory readoperations for the debug value instruction’s value/address operand and forthe (N - 1) operations immediately following theDW_OP_LLVM_entry_value refer to their respective values at functionentry. For example, !DIExpression(DW_OP_LLVM_entry_value, 1,DW_OP_plus_uconst, 123, DW_OP_stack_value) specifies an expression wherethe entry value of the debug value instruction’s value/address operand ispushed to the stack, and is added with 123. Due to framework limitationsN can currently only be 1.

DW_OP_LLVM_entry_value is only legal in MIR. The operation is introducedby the LiveDebugValues pass; currently only for function parameters thatare unmodified throughout a function and that are described as simpleregister location descriptions. The operation is also introduced by theAsmPrinter pass when a call site parameter value(DW_AT_call_site_parameter_value) is represented as entry value of theparameter.

  • DW_OP_breg (or DW_OP_bregx) represents a content on the providedsigned offset of the specified register. The opcode is only generated by theAsmPrinter pass to describe call site parameter value which requires anexpression over two registers.

DWARF specifies three kinds of simple location descriptions: Register, memory,and implicit location descriptions. Note that a location description isdefined over certain ranges of a program, i.e the location of a variable maychange over the course of the program. Register and memory locationdescriptions describe the concrete location of a source variable (in thesense that a debugger might modify its value), whereas implicit locations_describe merely the actual _value of a source variable which might not existin registers or in memory (see DW_OP_stack_value).

A llvm.dbg.addr or llvm.dbg.declare intrinsic describes an indirectvalue (the address) of a source variable. The first operand of the intrinsicmust be an address of some kind. A DIExpression attached to the intrinsicrefines this address to produce a concrete location for the source variable.

A llvm.dbg.value intrinsic describes the direct value of a source variable.The first operand of the intrinsic may be a direct or indirect value. ADIExpression attached to the intrinsic refines the first operand to produce adirect value. For example, if the first operand is an indirect value, it may benecessary to insert DW_OP_deref into the DIExpression in order to produce avalid debug intrinsic.

Note

A DIExpression is interpreted in the same way regardless of which kind ofdebug intrinsic it’s attached to.

!0 = !DIExpression(DW_OP_deref)
!1 = !DIExpression(DW_OP_plus_uconst, 3)
!1 = !DIExpression(DW_OP_constu, 3, DW_OP_plus)
!2 = !DIExpression(DW_OP_bit_piece, 3, 7)
!3 = !DIExpression(DW_OP_deref, DW_OP_constu, 3, DW_OP_plus, DW_OP_LLVM_fragment, 3, 7)
!4 = !DIExpression(DW_OP_constu, 2, DW_OP_swap, DW_OP_xderef)
!5 = !DIExpression(DW_OP_constu, 42, DW_OP_stack_value)
DIFlags

These flags encode various properties of DINodes.

The ExportSymbols flag marks a class, struct or union whose membersmay be referenced as if they were defined in the containing class orunion. This flag is used to decide whether the DW_AT_export_symbols canbe used for the structure type.

DIObjCProperty

DIObjCProperty nodes represent Objective-C property nodes.

!3 = !DIObjCProperty(name: "foo", file: !1, line: 7, setter: "setFoo",
                     getter: "getFoo", attributes: 7, type: !2)
DIImportedEntity

DIImportedEntity nodes represent entities (such as modules) imported into acompile unit.

!2 = !DIImportedEntity(tag: DW_TAG_imported_module, name: "foo", scope: !0,
                       entity: !1, line: 7)
DIMacro

DIMacro nodes represent definition or undefinition of a macro identifiers.The name: field is the macro identifier, followed by macro parameters whendefining a function-like macro, and the value field is the token-stringused to expand the macro identifier.

!2 = !DIMacro(macinfo: DW_MACINFO_define, line: 7, name: "foo(x)",
              value: "((x) + 1)")
!3 = !DIMacro(macinfo: DW_MACINFO_undef, line: 30, name: "foo")
DIMacroFile

DIMacroFile nodes represent inclusion of source files.The nodes: field is a list of DIMacro and DIMacroFile nodes thatappear in the included source file.

!2 = !DIMacroFile(macinfo: DW_MACINFO_start_file, line: 7, file: !2,
                  nodes: !3)

‘tbaa’ Metadata

In LLVM IR, memory does not have types, so LLVM’s own type system is notsuitable for doing type based alias analysis (TBAA). Instead, metadata isadded to the IR to describe a type system of a higher level language. Thiscan be used to implement C/C++ strict type aliasing rules, but it can alsobe used to implement custom alias analysis behavior for other languages.

This description of LLVM’s TBAA system is broken into two parts:Semantics talks about high level issues, andRepresentation talks about the metadataencoding of various entities.

It is always possible to trace any TBAA node to a “root” TBAA node (detailsin the Representation section). TBAAnodes with different roots have an unknown aliasing relationship, and LLVMconservatively infers MayAlias between them. The rules mentioned inthis section only pertain to TBAA nodes living under the same root.

Semantics

The TBAA metadata system, referred to as “struct path TBAA” (not to beconfused with tbaa.struct), consists of the following high levelconcepts: Type Descriptors, further subdivided into scalar typedescriptors and struct type descriptors; and Access Tags.

Type descriptors describe the type system of the higher level languagebeing compiled. Scalar type descriptors describe types that do notcontain other types. Each scalar type has a parent type, which must alsobe a scalar type or the TBAA root. Via this parent relation, scalar typeswithin a TBAA root form a tree. Struct type descriptors denote typesthat contain a sequence of other type descriptors, at known offsets. Thesecontained type descriptors can either be struct type descriptors themselvesor scalar type descriptors.

Access tags are metadata nodes attached to load and store instructions.Access tags use type descriptors to describe the location being accessedin terms of the type system of the higher level language. Access tags aretuples consisting of a base type, an access type and an offset. The basetype is a scalar type descriptor or a struct type descriptor, the accesstype is a scalar type descriptor, and the offset is a constant integer.

The access tag (BaseTy, AccessTy, Offset) can describe one of twothings:

  • If BaseTy is a struct type, the tag describes a memory access (loador store) of a value of type AccessTy contained in the struct typeBaseTy at offset Offset.
  • If BaseTy is a scalar type, Offset must be 0 and BaseTy andAccessTy must be the same; and the access tag describes a scalaraccess with scalar type AccessTy.

We first define an ImmediateParent relation on (BaseTy, Offset)tuples this way:

  • If BaseTy is a scalar type then ImmediateParent(BaseTy, 0) is(ParentTy, 0) where ParentTy is the parent of the scalar type asdescribed in the TBAA metadata. ImmediateParent(BaseTy, Offset) isundefined if Offset is non-zero.
  • If BaseTy is a struct type then ImmediateParent(BaseTy, Offset)is (NewTy, NewOffset) where NewTy is the type contained inBaseTy at offset Offset and NewOffset is Offset adjustedto be relative within that inner type.

A memory access with an access tag (BaseTy1, AccessTy1, Offset1)aliases a memory access with an access tag (BaseTy2, AccessTy2,Offset2) if either (BaseTy1, Offset1) is reachable from (Base2,Offset2) via the Parent relation or vice versa.

As a concrete example, the type descriptor graph for the following program

struct Inner {
  int i;    // offset 0
  float f;  // offset 4
};

struct Outer {
  float f;  // offset 0
  double d; // offset 4
  struct Inner inner_a;  // offset 12
};

void f(struct Outer* outer, struct Inner* inner, float* f, int* i, char* c) {
  outer->f = 0;            // tag0: (OuterStructTy, FloatScalarTy, 0)
  outer->inner_a.i = 0;    // tag1: (OuterStructTy, IntScalarTy, 12)
  outer->inner_a.f = 0.0;  // tag2: (OuterStructTy, FloatScalarTy, 16)
  *f = 0.0;                // tag3: (FloatScalarTy, FloatScalarTy, 0)
}

is (note that in C and C++, char can be used to access any arbitrarytype):

Root = "TBAA Root"
CharScalarTy = ("char", Root, 0)
FloatScalarTy = ("float", CharScalarTy, 0)
DoubleScalarTy = ("double", CharScalarTy, 0)
IntScalarTy = ("int", CharScalarTy, 0)
InnerStructTy = {"Inner" (IntScalarTy, 0), (FloatScalarTy, 4)}
OuterStructTy = {"Outer", (FloatScalarTy, 0), (DoubleScalarTy, 4),
                 (InnerStructTy, 12)}

with (e.g.) ImmediateParent(OuterStructTy, 12) = (InnerStructTy,0), ImmediateParent(InnerStructTy, 0) = (IntScalarTy, 0), andImmediateParent(IntScalarTy, 0) = (CharScalarTy, 0).

Representation

The root node of a TBAA type hierarchy is an MDNode with 0 operands orwith exactly one MDString operand.

Scalar type descriptors are represented as an MDNode s with twooperands. The first operand is an MDString denoting the name of thestruct type. LLVM does not assign meaning to the value of this operand, itonly cares about it being an MDString. The second operand is anMDNode which points to the parent for said scalar type descriptor,which is either another scalar type descriptor or the TBAA root. Scalartype descriptors can have an optional third argument, but that must be theconstant integer zero.

Struct type descriptors are represented as MDNode s with an odd numberof operands greater than 1. The first operand is an MDString denotingthe name of the struct type. Like in scalar type descriptors the actualvalue of this name operand is irrelevant to LLVM. After the name operand,the struct type descriptors have a sequence of alternating MDNode andConstantInt operands. With N starting from 1, the 2N - 1 th operand,an MDNode, denotes a contained field, and the 2N th operand, aConstantInt, is the offset of the said contained field. The offsetsmust be in non-decreasing order.

Access tags are represented as MDNode s with either 3 or 4 operands.The first operand is an MDNode pointing to the node representing thebase type. The second operand is an MDNode pointing to the noderepresenting the access type. The third operand is a ConstantInt thatstates the offset of the access. If a fourth field is present, it must bea ConstantInt valued at 0 or 1. If it is 1 then the access tag statesthat the location being accessed is “constant” (meaningpointsToConstantMemory should return true; see other usefulAliasAnalysis methods). The TBAA root ofthe access type and the base type of an access tag must be the same, andthat is the TBAA root of the access tag.

‘tbaa.struct’ Metadata

The llvm.memcpy is often used to implementaggregate assignment operations in C and similar languages, however itis defined to copy a contiguous region of memory, which is more thanstrictly necessary for aggregate types which contain holes due topadding. Also, it doesn’t contain any TBAA information about the fieldsof the aggregate.

!tbaa.struct metadata can describe which memory subregions in amemcpy are padding and what the TBAA tags of the struct are.

The current metadata format is very simple. !tbaa.struct metadatanodes are a list of operands which are in conceptual groups of three.For each group of three, the first operand gives the byte offset of afield in bytes, the second gives its size in bytes, and the third givesits tbaa tag. e.g.:

!4 = !{ i64 0, i64 4, !1, i64 8, i64 4, !2 }

This describes a struct with two fields. The first is at offset 0 byteswith size 4 bytes, and has tbaa tag !1. The second is at offset 8 bytesand has size 4 bytes and has tbaa tag !2.

Note that the fields need not be contiguous. In this example, there is a4 byte gap between the two fields. This gap represents padding whichdoes not carry useful data and need not be preserved.

‘noalias’ and ‘alias.scope’ Metadata

noalias and alias.scope metadata provide the ability to specify genericnoalias memory-access sets. This means that some collection of memory accessinstructions (loads, stores, memory-accessing calls, etc.) that carrynoalias metadata can specifically be specified not to alias with some othercollection of memory access instructions that carry alias.scope metadata.Each type of metadata specifies a list of scopes where each scope has an id anda domain.

When evaluating an aliasing query, if for some domain, the setof scopes with that domain in one instruction’s alias.scope list is asubset of (or equal to) the set of scopes for that domain in anotherinstruction’s noalias list, then the two memory accesses are assumed not toalias.

Because scopes in one domain don’t affect scopes in other domains, separatedomains can be used to compose multiple independent noalias sets. This isused for example during inlining. As the noalias function parameters areturned into noalias scope metadata, a new domain is used every time thefunction is inlined.

The metadata identifying each domain is itself a list containing one or twoentries. The first entry is the name of the domain. Note that if the name is astring then it can be combined across functions and translation units. Aself-reference can be used to create globally unique domain names. Adescriptive string may optionally be provided as a second list entry.

The metadata identifying each scope is also itself a list containing two orthree entries. The first entry is the name of the scope. Note that if the nameis a string then it can be combined across functions and translation units. Aself-reference can be used to create globally unique scope names. A metadatareference to the scope’s domain is the second entry. A descriptive string mayoptionally be provided as a third list entry.

For example,

; Two scope domains:
!0 = !{!0}
!1 = !{!1}

; Some scopes in these domains:
!2 = !{!2, !0}
!3 = !{!3, !0}
!4 = !{!4, !1}

; Some scope lists:
!5 = !{!4} ; A list containing only scope !4
!6 = !{!4, !3, !2}
!7 = !{!3}

; These two instructions don't alias:
%0 = load float, float* %c, align 4, !alias.scope !5
store float %0, float* %arrayidx.i, align 4, !noalias !5

; These two instructions also don't alias (for domain !1, the set of scopes
; in the !alias.scope equals that in the !noalias list):
%2 = load float, float* %c, align 4, !alias.scope !5
store float %2, float* %arrayidx.i2, align 4, !noalias !6

; These two instructions may alias (for domain !0, the set of scopes in
; the !noalias list is not a superset of, or equal to, the scopes in the
; !alias.scope list):
%2 = load float, float* %c, align 4, !alias.scope !6
store float %0, float* %arrayidx.i, align 4, !noalias !7

‘fpmath’ Metadata

fpmath metadata may be attached to any instruction of floating-pointtype. It can be used to express the maximum acceptable error in theresult of that instruction, in ULPs, thus potentially allowing thecompiler to use a more efficient but less accurate method of computingit. ULP is defined as follows:

If x is a real number that lies between two finite consecutivefloating-point numbers a and b, without being equal to oneof them, then ulp(x) = |b - a|, otherwise ulp(x) is thedistance between the two non-equal finite floating-point numbersnearest x. Moreover, ulp(NaN) is NaN.

The metadata node shall consist of a single positive float type numberrepresenting the maximum relative error, for example:

!0 = !{ float 2.5 } ; maximum acceptable inaccuracy is 2.5 ULPs

‘range’ Metadata

range metadata may be attached only to load, call and invoke ofinteger types. It expresses the possible ranges the loaded value or the valuereturned by the called function at this call site is in. If the loaded orreturned value is not in the specified range, the behavior is undefined. Theranges are represented with a flattened list of integers. The loaded value orthe value returned is known to be in the union of the ranges defined by eachconsecutive pair. Each pair has the following properties:

  • The type must match the type loaded by the instruction.
  • The pair a,b represents the range [a,b).
  • Both a and b are constants.
  • The range is allowed to wrap.
  • The range should not represent the full or empty set. That is,a!=b.

In addition, the pairs must be in signed order of the lower bound andthey must be non-contiguous.

Examples:

  %a = load i8, i8* %x, align 1, !range !0 ; Can only be 0 or 1
  %b = load i8, i8* %y, align 1, !range !1 ; Can only be 255 (-1), 0 or 1
  %c = call i8 @foo(),       !range !2 ; Can only be 0, 1, 3, 4 or 5
  %d = invoke i8 @bar() to label %cont
         unwind label %lpad, !range !3 ; Can only be -2, -1, 3, 4 or 5
...
!0 = !{ i8 0, i8 2 }
!1 = !{ i8 255, i8 2 }
!2 = !{ i8 0, i8 2, i8 3, i8 6 }
!3 = !{ i8 -2, i8 0, i8 3, i8 6 }

‘absolute_symbol’ Metadata

absolutesymbol metadata may be attached to a global variabledeclaration. It marks the declaration as a reference to an absolute symbol,which causes the backend to use absolute relocations for the symbol evenin position independent code, and expresses the possible ranges that theglobal variable’s _address (not its value) is in, in the same format asrange metadata, with the extension that the pair all-ones,all-onesmay be used to represent the full set.

Example (assuming 64-bit pointers):

  @a = external global i8, !absolute_symbol !0 ; Absolute symbol in range [0,256)
  @b = external global i8, !absolute_symbol !1 ; Absolute symbol in range [0,2^64)

...
!0 = !{ i64 0, i64 256 }
!1 = !{ i64 -1, i64 -1 }

‘callees’ Metadata

callees metadata may be attached to indirect call sites. If calleesmetadata is attached to a call site, and any callee is not among the set offunctions provided by the metadata, the behavior is undefined. The intent ofthis metadata is to facilitate optimizations such as indirect-call promotion.For example, in the code below, the call instruction may only target theadd or sub functions:

%result = call i64 %binop(i64 %x, i64 %y), !callees !0

...
!0 = !{i64 (i64, i64)* @add, i64 (i64, i64)* @sub}

‘callback’ Metadata

callback metadata may be attached to a function declaration, or definition.(Call sites are excluded only due to the lack of a use case.) For ease ofexposition, we’ll refer to the function annotated w/ metadata as a brokerfunction. The metadata describes how the arguments of a call to the broker arein turn passed to the callback function specified by the metadata. Thus, thecallback metadata provides a partial description of a call site inside thebroker function with regards to the arguments of a call to the broker. The onlysemantic restriction on the broker function itself is that it is not allowed toinspect or modify arguments referenced in the callback metadata aspass-through to the callback function.

The broker is not required to actually invoke the callback function at runtime.However, the assumptions about not inspecting or modifying arguments that wouldbe passed to the specified callback function still hold, even if the callbackfunction is not dynamically invoked. The broker is allowed to invoke thecallback function more than once per invocation of the broker. The broker isalso allowed to invoke (directly or indirectly) the function passed as acallback through another use. Finally, the broker is also allowed to relay thecallback callee invocation to a different thread.

The metadata is structured as follows: At the outer level, callbackmetadata is a list of callback encodings. Each encoding starts with aconstant i64 which describes the argument position of the callback functionin the call to the broker. The following elements, except the last, describewhat arguments are passed to the callback function. Each element is again ani64 constant identifying the argument of the broker that is passed through,or i64 -1 to indicate an unknown or inspected argument. The order in whichthey are listed has to be the same in which they are passed to the callbackcallee. The last element of the encoding is a boolean which specifies howvariadic arguments of the broker are handled. If it is true, all variadicarguments of the broker are passed through to the callback function after thearguments encoded explicitly before.

In the code below, the pthread_create function is marked as a brokerthrough the !callback !1 metadata. In the example, there is only onecallback encoding, namely !2, associated with the broker. This encodingidentifies the callback function as the second argument of the broker (i642) and the sole argument of the callback function as the third one of thebroker function (i64 3).

declare !callback !1 dso_local i32 @pthread_create(i64*, %union.pthread_attr_t*, i8* (i8*)*, i8*)

...
!2 = !{i64 2, i64 3, i1 false}
!1 = !{!2}

Another example is shown below. The callback callee is the second argument ofthe kmpc_fork_call function (i64 2). The callee is given two unknownvalues (each identified by a i64 -1) and afterwards allvariadic arguments that are passed to the kmpc_fork_call call (due to thefinal i1 true).

declare !callback !0 dso_local void @__kmpc_fork_call(%struct.ident_t*, i32, void (i32*, i32*, ...)*, ...)

...
!1 = !{i64 2, i64 -1, i64 -1, i1 true}
!0 = !{!1}

‘unpredictable’ Metadata

unpredictable metadata may be attached to any branch or switchinstruction. It can be used to express the unpredictability of controlflow. Similar to the llvm.expect intrinsic, it may be used to alteroptimizations related to compare and branch instructions. The metadatais treated as a boolean value; if it exists, it signals that the branchor switch that it is attached to is completely unpredictable.

‘dereferenceable’ Metadata

The existence of the !dereferenceable metadata on the instructiontells the optimizer that the value loaded is known to be dereferenceable.The number of bytes known to be dereferenceable is specified by the integervalue in the metadata node. This is analogous to the ‘’dereferenceable’’attribute on parameters and return values.

‘dereferenceable_or_null’ Metadata

The existence of the !dereferenceable_or_null metadata on theinstruction tells the optimizer that the value loaded is known to be eitherdereferenceable or null.The number of bytes known to be dereferenceable is specified by the integervalue in the metadata node. This is analogous to the ‘’dereferenceable_or_null’’attribute on parameters and return values.

‘llvm.loop’

It is sometimes useful to attach information to loop constructs. Currently,loop metadata is implemented as metadata attached to the branch instructionin the loop latch block. This type of metadata refer to a metadata node that isguaranteed to be separate for each loop. The loop identifier metadata isspecified with the name llvm.loop.

The loop identifier metadata is implemented using a metadata that refers toitself to avoid merging it with any other identifier metadata, e.g.,during module linkage or function inlining. That is, each loop should referto their own identification metadata even if they reside in separate functions.The following example contains loop identifier metadata for two separate loopconstructs:

!0 = !{!0}
!1 = !{!1}

The loop identifier metadata can be used to specify additionalper-loop metadata. Any operands after the first operand can be treatedas user-defined metadata. For example the llvm.loop.unroll.countsuggests an unroll factor to the loop unroller:

  br i1 %exitcond, label %._crit_edge, label %.lr.ph, !llvm.loop !0
...
!0 = !{!0, !1}
!1 = !{!"llvm.loop.unroll.count", i32 4}

‘llvm.loop.disable_nonforced’

This metadata disables all optional loop transformations unlessexplicitly instructed using other transformation metadata such asllvm.loop.unroll.enable. That is, no heuristic will try to determinewhether a transformation is profitable. The purpose is to avoid that theloop is transformed to a different loop before an explicitly requested(forced) transformation is applied. For instance, loop fusion can makeother transformations impossible. Mandatory loop canonicalizations suchas loop rotation are still applied.

It is recommended to use this metadata in addition to any llvm.loop.*transformation directive. Also, any loop should have at most onedirective applied to it (and a sequence of transformations built usingfollowup-attributes). Otherwise, which transformation will be applieddepends on implementation details such as the pass pipeline order.

See Code Transformation Metadata for details.

‘llvm.loop.vectorize’ and ‘llvm.loop.interleave’

Metadata prefixed with llvm.loop.vectorize or llvm.loop.interleave areused to control per-loop vectorization and interleaving parameters such asvectorization width and interleave count. These metadata should be used inconjunction with llvm.loop loop identification metadata. Thellvm.loop.vectorize and llvm.loop.interleave metadata are onlyoptimization hints and the optimizer will only interleave and vectorize loops ifit believes it is safe to do so. The llvm.loop.parallel_accesses metadatawhich contains information about loop-carried memory dependencies can be helpfulin determining the safety of these transformations.

‘llvm.loop.interleave.count’ Metadata

This metadata suggests an interleave count to the loop interleaver.The first operand is the string llvm.loop.interleave.count and thesecond operand is an integer specifying the interleave count. Forexample:

!0 = !{!"llvm.loop.interleave.count", i32 4}

Note that setting llvm.loop.interleave.count to 1 disables interleavingmultiple iterations of the loop. If llvm.loop.interleave.count is set to 0then the interleave count will be determined automatically.

‘llvm.loop.vectorize.enable’ Metadata

This metadata selectively enables or disables vectorization for the loop. Thefirst operand is the string llvm.loop.vectorize.enable and the second operandis a bit. If the bit operand value is 1 vectorization is enabled. A value of0 disables vectorization:

!0 = !{!"llvm.loop.vectorize.enable", i1 0}
!1 = !{!"llvm.loop.vectorize.enable", i1 1}

‘llvm.loop.vectorize.predicate.enable’ Metadata

This metadata selectively enables or disables creating predicated instructionsfor the loop, which can enable folding of the scalar epilogue loop into themain loop. The first operand is the stringllvm.loop.vectorize.predicate.enable and the second operand is a bit. Ifthe bit operand value is 1 vectorization is enabled. A value of 0 disablesvectorization:

!0 = !{!"llvm.loop.vectorize.predicate.enable", i1 0}
!1 = !{!"llvm.loop.vectorize.predicate.enable", i1 1}

‘llvm.loop.vectorize.width’ Metadata

This metadata sets the target width of the vectorizer. The firstoperand is the string llvm.loop.vectorize.width and the secondoperand is an integer specifying the width. For example:

!0 = !{!"llvm.loop.vectorize.width", i32 4}

Note that setting llvm.loop.vectorize.width to 1 disablesvectorization of the loop. If llvm.loop.vectorize.width is set to0 or if the loop does not have this metadata the width will bedetermined automatically.

‘llvm.loop.vectorize.followup_vectorized’ Metadata

This metadata defines which loop attributes the vectorized loop willhave. See Code Transformation Metadata for details.

‘llvm.loop.vectorize.followup_epilogue’ Metadata

This metadata defines which loop attributes the epilogue will have. Theepilogue is not vectorized and is executed when either the vectorizedloop is not known to preserve semantics (because e.g., it processes twoarrays that are found to alias by a runtime check) or for the lastiterations that do not fill a complete set of vector lanes. SeeTransformation Metadata for details.

‘llvm.loop.vectorize.followup_all’ Metadata

Attributes in the metadata will be added to both the vectorized andepilogue loop.See Transformation Metadata for details.

‘llvm.loop.unroll’

Metadata prefixed with llvm.loop.unroll are loop unrollingoptimization hints such as the unroll factor. llvm.loop.unrollmetadata should be used in conjunction with llvm.loop loopidentification metadata. The llvm.loop.unroll metadata are onlyoptimization hints and the unrolling will only be performed if theoptimizer believes it is safe to do so.

‘llvm.loop.unroll.count’ Metadata

This metadata suggests an unroll factor to the loop unroller. Thefirst operand is the string llvm.loop.unroll.count and the secondoperand is a positive integer specifying the unroll factor. Forexample:

!0 = !{!"llvm.loop.unroll.count", i32 4}

If the trip count of the loop is less than the unroll count the loopwill be partially unrolled.

‘llvm.loop.unroll.disable’ Metadata

This metadata disables loop unrolling. The metadata has a single operandwhich is the string llvm.loop.unroll.disable. For example:

!0 = !{!"llvm.loop.unroll.disable"}

‘llvm.loop.unroll.runtime.disable’ Metadata

This metadata disables runtime loop unrolling. The metadata has a singleoperand which is the string llvm.loop.unroll.runtime.disable. For example:

!0 = !{!"llvm.loop.unroll.runtime.disable"}

‘llvm.loop.unroll.enable’ Metadata

This metadata suggests that the loop should be fully unrolled if the trip countis known at compile time and partially unrolled if the trip count is not knownat compile time. The metadata has a single operand which is the stringllvm.loop.unroll.enable. For example:

!0 = !{!"llvm.loop.unroll.enable"}

‘llvm.loop.unroll.full’ Metadata

This metadata suggests that the loop should be unrolled fully. Themetadata has a single operand which is the string llvm.loop.unroll.full.For example:

!0 = !{!"llvm.loop.unroll.full"}

‘llvm.loop.unroll.followup’ Metadata

This metadata defines which loop attributes the unrolled loop will have.See Transformation Metadata for details.

‘llvm.loop.unroll.followup_remainder’ Metadata

This metadata defines which loop attributes the remainder loop afterpartial/runtime unrolling will have. SeeTransformation Metadata for details.

‘llvm.loop.unroll_and_jam’

This metadata is treated very similarly to the llvm.loop.unroll metadataabove, but affect the unroll and jam pass. In addition any loop withllvm.loop.unroll metadata but no llvm.loop.unroll_and_jam metadata willdisable unroll and jam (so llvm.loop.unroll metadata will be left to theunroller, plus llvm.loop.unroll.disable metadata will disable unroll and jamtoo.)

The metadata for unroll and jam otherwise is the same as for unroll.llvm.loop.unroll_and_jam.enable, llvm.loop.unroll_and_jam.disable andllvm.loop.unroll_and_jam.count do the same as for unroll.llvm.loop.unroll_and_jam.full is not supported. Again these are only hintsand the normal safety checks will still be performed.

‘llvm.loop.unroll_and_jam.count’ Metadata

This metadata suggests an unroll and jam factor to use, similarly tollvm.loop.unroll.count. The first operand is the stringllvm.loop.unroll_and_jam.count and the second operand is a positive integerspecifying the unroll factor. For example:

!0 = !{!"llvm.loop.unroll_and_jam.count", i32 4}

If the trip count of the loop is less than the unroll count the loopwill be partially unroll and jammed.

‘llvm.loop.unroll_and_jam.disable’ Metadata

This metadata disables loop unroll and jamming. The metadata has a singleoperand which is the string llvm.loop.unroll_and_jam.disable. For example:

!0 = !{!"llvm.loop.unroll_and_jam.disable"}

‘llvm.loop.unroll_and_jam.enable’ Metadata

This metadata suggests that the loop should be fully unroll and jammed if thetrip count is known at compile time and partially unrolled if the trip count isnot known at compile time. The metadata has a single operand which is thestring llvm.loop.unroll_and_jam.enable. For example:

!0 = !{!"llvm.loop.unroll_and_jam.enable"}

‘llvm.loop.unroll_and_jam.followup_outer’ Metadata

This metadata defines which loop attributes the outer unrolled loop willhave. See Transformation Metadata fordetails.

‘llvm.loop.unroll_and_jam.followup_inner’ Metadata

This metadata defines which loop attributes the inner jammed loop willhave. See Transformation Metadata fordetails.

‘llvm.loop.unroll_and_jam.followup_remainder_outer’ Metadata

This metadata defines which attributes the epilogue of the outer loopwill have. This loop is usually unrolled, meaning there is no suchloop. This attribute will be ignored in this case. SeeTransformation Metadata for details.

‘llvm.loop.unroll_and_jam.followup_remainder_inner’ Metadata

This metadata defines which attributes the inner loop of the epiloguewill have. The outer epilogue will usually be unrolled, meaning therecan be multiple inner remainder loops. SeeTransformation Metadata for details.

‘llvm.loop.unroll_and_jam.followup_all’ Metadata

Attributes specified in the metadata is added to allllvm.loop.unroll_and_jam.* loops. SeeTransformation Metadata for details.

‘llvm.loop.licm_versioning.disable’ Metadata

This metadata indicates that the loop should not be versioned for the purposeof enabling loop-invariant code motion (LICM). The metadata has a single operandwhich is the string llvm.loop.licm_versioning.disable. For example:

!0 = !{!"llvm.loop.licm_versioning.disable"}

‘llvm.loop.distribute.enable’ Metadata

Loop distribution allows splitting a loop into multiple loops. Currently,this is only performed if the entire loop cannot be vectorized due to unsafememory dependencies. The transformation will attempt to isolate the unsafedependencies into their own loop.

This metadata can be used to selectively enable or disable distribution of theloop. The first operand is the string llvm.loop.distribute.enable and thesecond operand is a bit. If the bit operand value is 1 distribution isenabled. A value of 0 disables distribution:

!0 = !{!"llvm.loop.distribute.enable", i1 0}
!1 = !{!"llvm.loop.distribute.enable", i1 1}

This metadata should be used in conjunction with llvm.loop loopidentification metadata.

‘llvm.loop.distribute.followup_coincident’ Metadata

This metadata defines which attributes extracted loops with no cyclicdependencies will have (i.e. can be vectorized). SeeTransformation Metadata for details.

‘llvm.loop.distribute.followup_sequential’ Metadata

This metadata defines which attributes the isolated loops with unsafememory dependencies will have. SeeTransformation Metadata for details.

‘llvm.loop.distribute.followup_fallback’ Metadata

If loop versioning is necessary, this metadata defined the attributesthe non-distributed fallback version will have. SeeTransformation Metadata for details.

‘llvm.loop.distribute.followup_all’ Metadata

The attributes in this metadata is added to all followup loops of theloop distribution pass. SeeTransformation Metadata for details.

‘llvm.licm.disable’ Metadata

This metadata indicates that loop-invariant code motion (LICM) should not beperformed on this loop. The metadata has a single operand which is the stringllvm.licm.disable. For example:

!0 = !{!"llvm.licm.disable"}

Note that although it operates per loop it isn’t given the llvm.loop prefixas it is not affected by the llvm.loop.disable_nonforced metadata.

‘llvm.access.group’ Metadata

llvm.access.group metadata can be attached to any instruction thatpotentially accesses memory. It can point to a single distinct metadatanode, which we call access group. This node represents all memory accessinstructions referring to it via llvm.access.group. When aninstruction belongs to multiple access groups, it can also point to alist of accesses groups, illustrated by the following example.

%val = load i32, i32* %arrayidx, !llvm.access.group !0
...
!0 = !{!1, !2}
!1 = distinct !{}
!2 = distinct !{}

It is illegal for the list node to be empty since it might be confusedwith an access group.

The access group metadata node must be ‘distinct’ to avoid collapsingmultiple access groups by content. A access group metadata node mustalways be empty which can be used to distinguish an access groupmetadata node from a list of access groups. Being empty avoids thesituation that the content must be updated which, because metadata isimmutable by design, would required finding and updating all referencesto the access group node.

The access group can be used to refer to a memory access instructionwithout pointing to it directly (which is not possible in globalmetadata). Currently, the only metadata making use of it isllvm.loop.parallel_accesses.

‘llvm.loop.parallel_accesses’ Metadata

The llvm.loop.parallel_accesses metadata refers to one or moreaccess group metadata nodes (see llvm.access.group). It denotes thatno loop-carried memory dependence exist between it and other instructionsin the loop with this metadata.

Let m1 and m2 be two instructions that both have thellvm.access.group metadata to the access group g1, respectivelyg2 (which might be identical). If a loop contains both access groupsin its llvm.loop.parallel_accesses metadata, then the compiler canassume that there is no dependency between m1 and m2 carried bythis loop. Instructions that belong to multiple access groups areconsidered having this property if at least one of the access groupsmatches the llvm.loop.parallel_accesses list.

If all memory-accessing instructions in a loop havellvm.loop.parallel_accesses metadata that refers to that loop, then theloop has no loop carried memory dependences and is considered to be aparallel loop.

Note that if not all memory access instructions belong to an accessgroup referred to by llvm.loop.parallel_accesses, then the loop mustnot be considered trivially parallel. Additionalmemory dependence analysis is required to make that determination. As a failsafe mechanism, this causes loops that were originally parallel to be consideredsequential (if optimization passes that are unaware of the parallel semanticsinsert new memory instructions into the loop body).

Example of a loop that is considered parallel due to its correct use ofboth llvm.access.group and llvm.loop.parallel_accessesmetadata types.

for.body:
  ...
  %val0 = load i32, i32* %arrayidx, !llvm.access.group !1
  ...
  store i32 %val0, i32* %arrayidx1, !llvm.access.group !1
  ...
  br i1 %exitcond, label %for.end, label %for.body, !llvm.loop !0

for.end:
...
!0 = distinct !{!0, !{!"llvm.loop.parallel_accesses", !1}}
!1 = distinct !{}

It is also possible to have nested parallel loops:

outer.for.body:
  ...
  %val1 = load i32, i32* %arrayidx3, !llvm.access.group !4
  ...
  br label %inner.for.body

inner.for.body:
  ...
  %val0 = load i32, i32* %arrayidx1, !llvm.access.group !3
  ...
  store i32 %val0, i32* %arrayidx2, !llvm.access.group !3
  ...
  br i1 %exitcond, label %inner.for.end, label %inner.for.body, !llvm.loop !1

inner.for.end:
  ...
  store i32 %val1, i32* %arrayidx4, !llvm.access.group !4
  ...
  br i1 %exitcond, label %outer.for.end, label %outer.for.body, !llvm.loop !2

outer.for.end:                                          ; preds = %for.body
...
!1 = distinct !{!1, !{!"llvm.loop.parallel_accesses", !3}}     ; metadata for the inner loop
!2 = distinct !{!2, !{!"llvm.loop.parallel_accesses", !3, !4}} ; metadata for the outer loop
!3 = distinct !{} ; access group for instructions in the inner loop (which are implicitly contained in outer loop as well)
!4 = distinct !{} ; access group for instructions in the outer, but not the inner loop

‘irr_loop’ Metadata

irr_loop metadata may be attached to the terminator instruction of a basicblock that’s an irreducible loop header (note that an irreducible loop has morethan once header basic blocks.) If irr_loop metadata is attached to theterminator instruction of a basic block that is not really an irreducible loopheader, the behavior is undefined. The intent of this metadata is to improve theaccuracy of the block frequency propagation. For example, in the code below, theblock header0 may have a loop header weight (relative to the other headers ofthe irreducible loop) of 100:

header0:
...
br i1 %cmp, label %t1, label %t2, !irr_loop !0

...
!0 = !{"loop_header_weight", i64 100}

Irreducible loop header weights are typically based on profile data.

‘invariant.group’ Metadata

The experimental invariant.group metadata may be attached toload/store instructions referencing a single metadata with no entries.The existence of the invariant.group metadata on the instruction tellsthe optimizer that every load and store to the same pointer operandcan be assumed to load or store the samevalue (but see the llvm.launder.invariant.group intrinsic which affectswhen two pointers are considered the same). Pointers returned by bitcast orgetelementptr with only zero indices are considered the same.

Examples:

@unknownPtr = external global i8…%ptr = alloca i8store i8 42, i8 %ptr, !invariant.group !0call void @foo(i8 %ptr)

%a = load i8, i8 %ptr, !invariant.group !0 ; Can assume that value under %ptr didn't changecall void @foo(i8 %ptr)

%newPtr = call i8 @getPointer(i8 %ptr)%c = load i8, i8* %newPtr, !invariant.group !0 ; Can't assume anything, because we only have information about %ptr

%unknownValue = load i8, i8 @unknownPtrstore i8 %unknownValue, i8 %ptr, !invariant.group !0 ; Can assume that %unknownValue == 42

call void @foo(i8 %ptr)%newPtr2 = call i8 @llvm.launder.invariant.group(i8 %ptr)%d = load i8, i8 %newPtr2, !invariant.group !0 ; Can't step through launder.invariant.group to get value of %ptr

…declare void @foo(i8)declare i8 @getPointer(i8)declare i8 @llvm.launder.invariant.group(i8*)

!0 = !{}

The invariant.group metadata must be dropped when replacing one pointer byanother based on aliasing information. This is because invariant.group is tiedto the SSA value of the pointer operand.

%v = load i8, i8* %x, !invariant.group !0
; if %x mustalias %y then we can replace the above instruction with
%v = load i8, i8* %y

Note that this is an experimental feature, which means that its semantics mightchange in the future.

‘type’ Metadata

See Type Metadata.

‘associated’ Metadata

The associated metadata may be attached to a global objectdeclaration with a single argument that references another global object.

This metadata prevents discarding of the global object in linker GCunless the referenced object is also discarded. The linker support forthis feature is spotty. For best compatibility, globals carrying thismetadata may also:

  • Be in a comdat with the referenced global.
  • Be in @llvm.compiler.used.
  • Have an explicit section with a name which is a valid C identifier.

It does not have any effect on non-ELF targets.

Example:

$a = comdat any
@a = global i32 1, comdat $a
@b = internal global i32 2, comdat $a, section "abc", !associated !0
!0 = !{i32* @a}

‘prof’ Metadata

The prof metadata is used to record profile data in the IR.The first operand of the metadata node indicates the profile metadatatype. There are currently 3 types:branch_weights,function_entry_count, andVP.

branch_weights

Branch weight metadata attached to a branch, select, switch or call instructionrepresents the likeliness of the associated branch being taken.For more information, see LLVM Branch Weight Metadata.

function_entry_count

Function entry count metadata can be attached to function definitionsto record the number of times the function is called. Used with BFIinformation, it is also used to derive the basic block profile count.For more information, see LLVM Branch Weight Metadata.

VP

VP (value profile) metadata can be attached to instructions that havevalue profile information. Currently this is indirect calls (where itrecords the hottest callees) and calls to memory intrinsics such as memcpy,memmove, and memset (where it records the hottest byte lengths).

Each VP metadata node contains “VP” string, then a uint32_t value for the valueprofiling kind, a uint64_t value for the total number of times the instructionis executed, followed by uint64_t value and execution count pairs.The value profiling kind is 0 for indirect call targets and 1 for memoryoperations. For indirect call targets, each profile value is a hashof the callee function name, and for memory operations each value is thebyte length.

Note that the value counts do not need to add up to the total countlisted in the third operand (in practice only the top hottest valuesare tracked and reported).

Indirect call example:

call void %f(), !prof !1
!1 = !{!"VP", i32 0, i64 1600, i64 7651369219802541373, i64 1030, i64 -4377547752858689819, i64 410}

Note that the VP type is 0 (the second operand), which indicates this isan indirect call value profile data. The third operand indicates that theindirect call executed 1600 times. The 4th and 6th operands give thehashes of the 2 hottest target functions’ names (this is the same hash usedto represent function names in the profile database), and the 5th and 7thoperands give the execution count that each of the respective prior targetfunctions was called.

Module Flags Metadata

Information about the module as a whole is difficult to convey to LLVM’ssubsystems. The LLVM IR isn’t sufficient to transmit this information.The llvm.module.flags named metadata exists in order to facilitatethis. These flags are in the form of key / value pairs — much like adictionary — making it easy for any subsystem who cares about a flag tolook it up.

The llvm.module.flags metadata contains a list of metadata triplets.Each triplet has the following form:

  • The first element is a behavior flag, which specifies the behaviorwhen two (or more) modules are merged together, and it encounters two(or more) metadata with the same ID. The supported behaviors aredescribed below.
  • The second element is a metadata string that is a unique ID for themetadata. Each module may only have one flag entry for each unique ID (notincluding entries with the Require behavior).
  • The third element is the value of the flag.

When two (or more) modules are merged together, the resultingllvm.module.flags metadata is the union of the modules’ flags. That is, foreach unique metadata ID string, there will be exactly one entry in the mergedmodules llvm.module.flags metadata table, and the value for that entry willbe determined by the merge behavior flag, as described below. The only exceptionis that entries with the Require behavior are always preserved.

The following behaviors are supported:

ValueBehavior
1- Error- Emits an error if two values disagree, otherwise the resulting valueis that of the operands.
2- Warning- Emits a warning if two values disagree. The result value will be theoperand for the flag from the first module being linked, or the maxif the other module uses Max (in which case the resulting flagwill be Max).
3- Require- Adds a requirement that another module flag be present and have aspecified value after linking is performed. The value must be ametadata pair, where the first element of the pair is the ID of themodule flag to be restricted, and the second element of the pair isthe value the module flag should be restricted to. This behavior canbe used to restrict the allowable results (via triggering of anerror) of linking IDs with the Override behavior.
4- Override- Uses the specified value, regardless of the behavior or value of theother module. If both modules specify Override, but the valuesdiffer, an error will be emitted.
5- Append- Appends the two values, which are required to be metadata nodes.
6- AppendUnique- Appends the two values, which are required to be metadatanodes. However, duplicate entries in the second list are droppedduring the append operation.
7- Max- Takes the max of the two values, which are required to be integers.

It is an error for a particular unique flag ID to have multiple behaviors,except in the case of Require (which adds restrictions on another metadatavalue) or Override.

An example of module flags:

!0 = !{ i32 1, !"foo", i32 1 }
!1 = !{ i32 4, !"bar", i32 37 }
!2 = !{ i32 2, !"qux", i32 42 }
!3 = !{ i32 3, !"qux",
  !{
    !"foo", i32 1
  }
}
!llvm.module.flags = !{ !0, !1, !2, !3 }
  • Metadata !0 has the ID !"foo" and the value ‘1’. The behaviorif two or more !"foo" flags are seen is to emit an error if theirvalues are not equal.

  • Metadata !1 has the ID !"bar" and the value ‘37’. Thebehavior if two or more !"bar" flags are seen is to use the value‘37’.

  • Metadata !2 has the ID !"qux" and the value ‘42’. Thebehavior if two or more !"qux" flags are seen is to emit awarning if their values are not equal.

  • Metadata !3 has the ID !"qux" and the value:

!{ !"foo", i32 1 }

The behavior is to emit an error if the llvm.module.flags does notcontain a flag with the ID !"foo" that has the value ‘1’ after linking isperformed.

Objective-C Garbage Collection Module Flags Metadata

On the Mach-O platform, Objective-C stores metadata about garbagecollection in a special section called “image info”. The metadataconsists of a version number and a bitmask specifying what types ofgarbage collection are supported (if any) by the file. If two or moremodules are linked together their garbage collection metadata needs tobe merged rather than appended together.

The Objective-C garbage collection module flags metadata consists of thefollowing key-value pairs:

KeyValue
Objective-C Version[Required] — The Objective-C ABI version. Valid values are 1 and 2.
Objective-C Image Info Version[Required] — The version of the image info section. Currentlyalways 0.
Objective-C Image Info Section[Required] — The section to place the metadata. Valid values are"OBJC, image_info, regular" for Objective-C ABI version 1, and"DATA,objc_imageinfo, regular, no_dead_strip" forObjective-C ABI version 2.
Objective-C Garbage Collection[Required] — Specifies whether garbage collection is supported ornot. Valid values are 0, for no garbage collection, and 2, for garbagecollection supported.
Objective-C GC Only[Optional] — Specifies that only garbage collection is supported.If present, its value must be 6. This flag requires that theObjective-C Garbage Collection flag have the value 2.

Some important flag interactions:

  • If a module with Objective-C Garbage Collection set to 0 ismerged with a module with Objective-C Garbage Collection set to2, then the resulting module has theObjective-C Garbage Collection flag set to 0.
  • A module with Objective-C Garbage Collection set to 0 cannot bemerged with a module with Objective-C GC Only set to 6.

C type width Module Flags Metadata

The ARM backend emits a section into each generated object file describing theoptions that it was compiled with (in a compiler-independent way) to preventlinking incompatible objects, and to allow automatic library selection. Someof these options are not visible at the IR level, namely wchar_t width and enumwidth.

To pass this information to the backend, these options are encoded in moduleflags metadata, using the following key-value pairs:

KeyValue
short_wchar- 0 — sizeof(wchar_t) == 4- 1 — sizeof(wchar_t) == 2
short_enum- 0 — Enums are at least as large as an int.- 1 — Enums are stored in the smallest integer type which canrepresent all of its values.

For example, the following metadata section specifies that the module wascompiled with a wchar_t width of 4 bytes, and the underlying type of anenum is the smallest type which can represent all of its values:

!llvm.module.flags = !{!0, !1}
!0 = !{i32 1, !"short_wchar", i32 1}
!1 = !{i32 1, !"short_enum", i32 0}

LTO Post-Link Module Flags Metadata

Some optimisations are only when the entire LTO unit is present in the currentmodule. This is represented by the LTOPostLink module flags metadata, whichwill be created with a value of 1 when LTO linking occurs.

Automatic Linker Flags Named Metadata

Some targets support embedding of flags to the linker inside individual objectfiles. Typically this is used in conjunction with language extensions whichallow source files to contain linker command line options, and have theseautomatically be transmitted to the linker via object files.

These flags are encoded in the IR using named metadata with the name!llvm.linker.options. Each operand is expected to be a metadata nodewhich should be a list of other metadata nodes, each of which should be alist of metadata strings defining linker options.

For example, the following metadata section specifies two separate sets oflinker options, presumably to link against libz and the Cocoaframework:

!0 = !{ !"-lz" }
!1 = !{ !"-framework", !"Cocoa" }
!llvm.linker.options = !{ !0, !1 }

The metadata encoding as lists of lists of options, as opposed to a collapsedlist of options, is chosen so that the IR encoding can use multiple optionstrings to specify e.g., a single library, while still having that specifier bepreserved as an atomic element that can be recognized by a target specificassembly writer or object file emitter.

Each individual option is required to be either a valid option for the target’slinker, or an option that is reserved by the target specific assembly writer orobject file emitter. No other aspect of these options is defined by the IR.

Dependent Libs Named Metadata

Some targets support embedding of strings into object files to indicatea set of libraries to add to the link. Typically this is used in conjunctionwith language extensions which allow source files to explicitly declare thelibraries they depend on, and have these automatically be transmitted to thelinker via object files.

The list is encoded in the IR using named metadata with the name!llvm.dependent-libraries. Each operand is expected to be a metadata nodewhich should contain a single string operand.

For example, the following metadata section contains two library specifiers:

!0 = !{!"a library specifier"}
!1 = !{!"another library specifier"}
!llvm.dependent-libraries = !{ !0, !1 }

Each library specifier will be handled independently by the consuming linker.The effect of the library specifiers are defined by the consuming linker.

ThinLTO Summary

Compiling with ThinLTOcauses the building of a compact summary of the module that is emitted intothe bitcode. The summary is emitted into the LLVM assembly and identifiedin syntax by a caret (‘^’).

The summary is parsed into a bitcode output, along with the ModuleIR, via the “llvm-as” tool. Tools that parse the Module IR for the purposesof optimization (e.g. “clang -x ir” and “opt”), will ignore thesummary entries (just as they currently ignore summary entries in a bitcodeinput file).

Eventually, the summary will be parsed into a ModuleSummaryIndex object underthe same conditions where summary index is currently built from bitcode.Specifically, tools that test the Thin Link portion of a ThinLTO compile(i.e. llvm-lto and llvm-lto2), or when parsing a combined indexfor a distributed ThinLTO backend via clang’s “-fthinlto-index=<>” flag(this part is not yet implemented, use llvm-as to create a bitcode objectbefore feeding into thin link tools for now).

There are currently 3 types of summary entries in the LLVM assembly:module paths,global values, andtype identifiers.

Module Path Summary Entry

Each module path summary entry lists a module containing global values includedin the summary. For a single IR module there will be one such entry, butin a combined summary index produced during the thin link, there will beone module path entry per linked module with summary.

Example:

^0 = module: (path: "/path/to/file.o", hash: (2468601609, 1329373163, 1565878005, 638838075, 3148790418))

The path field is a string path to the bitcode file, and the hashfield is the 160-bit SHA-1 hash of the IR bitcode contents, used forincremental builds and caching.

Global Value Summary Entry

Each global value summary entry corresponds to a global value defined orreferenced by a summarized module.

Example:

^4 = gv: (name: "f"[, summaries: (Summary)[, (Summary)]*]?) ; guid = 14740650423002898831

For declarations, there will not be a summary list. For definitions, aglobal value will contain a list of summaries, one per module containinga definition. There can be multiple entries in a combined summary indexfor symbols with weak linkage.

Each Summary format will depend on whether the global value is afunction, variable, oralias.

Function Summary

If the global value is a function, the Summary entry will look like:

function: (module: ^0, flags: (linkage: external, notEligibleToImport: 0, live: 0, dsoLocal: 0), insts: 2[, FuncFlags]?[, Calls]?[, TypeIdInfo]?[, Refs]?

The module field includes the summary entry id for the module containingthis definition, and the flags field contains information such asthe linkage type, a flag indicating whether it is legal to import thedefinition, whether it is globally live and whether the linker resolved itto a local definition (the latter two are populated during the thin link).The insts field contains the number of IR instructions in the function.Finally, there are several optional fields: FuncFlags,Calls, TypeIdInfo,Refs.

Global Variable Summary

If the global value is a variable, the Summary entry will look like:

variable: (module: ^0, flags: (linkage: external, notEligibleToImport: 0, live: 0, dsoLocal: 0)[, Refs]?

The variable entry contains a subset of the fields in afunction summary, see the descriptions there.

Alias Summary

If the global value is an alias, the Summary entry will look like:

alias: (module: ^0, flags: (linkage: external, notEligibleToImport: 0, live: 0, dsoLocal: 0), aliasee: ^2)

The module and flags fields are as described for afunction summary. The aliasee fieldcontains a reference to the global value summary entry of the aliasee.

Function Flags

The optional FuncFlags field looks like:

funcFlags: (readNone: 0, readOnly: 0, noRecurse: 0, returnDoesNotAlias: 0)

If unspecified, flags are assumed to hold the conservative false value of0.

Calls

The optional Calls field looks like:

calls: ((Callee)[, (Callee)]*)

where each Callee looks like:

callee: ^1[, hotness: None]?[, relbf: 0]?

The callee refers to the summary entry id of the callee. At most oneof hotness (which can take the values Unknown, Cold, None,Hot, and Critical), and relbf (which holds the integerbranch frequency relative to the entry frequency, scaled down by 2^8)may be specified. The defaults are Unknown and 0, respectively.

Refs

The optional Refs field looks like:

refs: ((Ref)[, (Ref)]*)

where each Ref contains a reference to the summary id of the referencedvalue (e.g. ^1).

TypeIdInfo

The optional TypeIdInfo field, used forControl Flow Integrity,looks like:

typeIdInfo: [(TypeTests)]?[, (TypeTestAssumeVCalls)]?[, (TypeCheckedLoadVCalls)]?[, (TypeTestAssumeConstVCalls)]?[, (TypeCheckedLoadConstVCalls)]?

These optional fields have the following forms:

TypeTests
typeTests: (TypeIdRef[, TypeIdRef]*)

Where each TypeIdRef refers to a type idby summary id or GUID.

TypeTestAssumeVCalls
typeTestAssumeVCalls: (VFuncId[, VFuncId]*)

Where each VFuncId has the format:

vFuncId: (TypeIdRef, offset: 16)

Where each TypeIdRef refers to a type idby summary id or GUID preceded by a guid: tag.

TypeCheckedLoadVCalls
typeCheckedLoadVCalls: (VFuncId[, VFuncId]*)

Where each VFuncId has the format described for TypeTestAssumeVCalls.

TypeTestAssumeConstVCalls
typeTestAssumeConstVCalls: (ConstVCall[, ConstVCall]*)

Where each ConstVCall has the format:

(VFuncId, args: (Arg[, Arg]*))

and where each VFuncId has the format described for TypeTestAssumeVCalls,and each Arg is an integer argument number.

TypeCheckedLoadConstVCalls
typeCheckedLoadConstVCalls: (ConstVCall[, ConstVCall]*)

Where each ConstVCall has the format described forTypeTestAssumeConstVCalls.

Type ID Summary Entry

Each type id summary entry corresponds to a type identifier resolutionwhich is generated during the LTO link portion of the compile when buildingwith Control Flow Integrity,so these are only present in a combined summary index.

Example:

^4 = typeid: (name: "_ZTS1A", summary: (typeTestRes: (kind: allOnes, sizeM1BitWidth: 7[, alignLog2: 0]?[, sizeM1: 0]?[, bitMask: 0]?[, inlineBits: 0]?)[, WpdResolutions]?)) ; guid = 7004155349499253778

The typeTestRes gives the type test resolution kind (which maybe unsat, byteArray, inline, single, or allOnes), andthe size-1 bit width. It is followed by optional flags, which default to 0,and an optional WpdResolutions (whole program devirtualization resolution)field that looks like:

wpdResolutions: ((offset: 0, WpdRes)[, (offset: 1, WpdRes)]*

where each entry is a mapping from the given byte offset to the whole-programdevirtualization resolution WpdRes, that has one of the following formats:

wpdRes: (kind: branchFunnel)
wpdRes: (kind: singleImpl, singleImplName: "_ZN1A1nEi")
wpdRes: (kind: indir)

Additionally, each wpdRes has an optional resByArg field, whichdescribes the resolutions for calls with all constant integer arguments:

resByArg: (ResByArg[, ResByArg]*)

where ResByArg is:

args: (Arg[, Arg]*), byArg: (kind: UniformRetVal[, info: 0][, byte: 0][, bit: 0])

Where the kind can be Indir, UniformRetVal, UniqueRetValor VirtualConstProp. The info field is only used if the kindis UniformRetVal (indicates the uniform return value), orUniqueRetVal (holds the return value associated with the unique vtable(0 or 1)). The byte and bit fields are only used if the target doesnot support the use of absolute symbols to store constants.

Intrinsic Global Variables

LLVM has a number of “magic” global variables that contain data thataffect code generation or other IR semantics. These are documented here.All globals of this sort should have a section specified as“llvm.metadata”. This section and all globals that start with“llvm.” are reserved for use by LLVM.

The ‘llvm.used’ Global Variable

The @llvm.used global is an array which hasappending linkage. This array contains a list ofpointers to named global variables, functions and aliases which may optionallyhave a pointer cast formed of bitcast or getelementptr. For example, a legaluse of it is:

@X = global i8 4@Y = global i32 123

@llvm.used = appending global [2 x i8] [ i8 @X, i8 bitcast (i32 @Y to i8*)], section "llvm.metadata"

If a symbol appears in the @llvm.used list, then the compiler, assembler,and linker are required to treat the symbol as if there is a reference to thesymbol that it cannot see (which is why they have to be named). For example, ifa variable has internal linkage and no references other than that from the@llvm.used list, it cannot be deleted. This is commonly used to representreferences from inline asms and other things the compiler cannot “see”, andcorresponds to “attribute((used))” in GNU C.

On some targets, the code generator must emit a directive to theassembler or object file to prevent the assembler and linker fromremoving the symbol.

The ‘llvm.compiler.used’ Global Variable

The @llvm.compiler.used directive is the same as the @llvm.useddirective, except that it only prevents the compiler from touching thesymbol. On targets that support it, this allows an intelligent linker tooptimize references to the symbol without being impeded as it would beby @llvm.used.

This is a rare construct that should only be used in rare circumstances,and should not be exposed to source languages.

The ‘llvm.global_ctors’ Global Variable

%0 = type { i32, void ()*, i8* }
@llvm.global_ctors = appending global [1 x %0] [%0 { i32 65535, void ()* @ctor, i8* @data }]

The @llvm.global_ctors array contains a list of constructorfunctions, priorities, and an associated global or function.The functions referenced by this array will be called in ascending orderof priority (i.e. lowest first) when the module is loaded. The order offunctions with the same priority is not defined.

If the third field is non-null, and points to a global variableor function, the initializer function will only run if the associateddata from the current module is not discarded.

The ‘llvm.global_dtors’ Global Variable

%0 = type { i32, void ()*, i8* }
@llvm.global_dtors = appending global [1 x %0] [%0 { i32 65535, void ()* @dtor, i8* @data }]

The @llvm.global_dtors array contains a list of destructorfunctions, priorities, and an associated global or function.The functions referenced by this array will be called in descendingorder of priority (i.e. highest first) when the module is unloaded. Theorder of functions with the same priority is not defined.

If the third field is non-null, and points to a global variableor function, the destructor function will only run if the associateddata from the current module is not discarded.

Instruction Reference

The LLVM instruction set consists of several different classificationsof instructions: terminator instructions, binaryinstructions, bitwise binaryinstructions, memory instructions, andother instructions.

Terminator Instructions

As mentioned previously, every basic block in aprogram ends with a “Terminator” instruction, which indicates whichblock should be executed after the current block is finished. Theseterminator instructions typically yield a ‘void’ value: they producecontrol flow, not values (the one exception being the‘invoke’ instruction).

The terminator instructions are: ‘ret’,‘br’, ‘switch’,‘indirectbr’, ‘invoke’,‘callbr’‘resume’, ‘catchswitch’,‘catchret’,‘cleanupret’,and ‘unreachable’.

‘ret’ Instruction

Syntax:
ret <type> <value>       ; Return a value from a non-void function
ret void                 ; Return from void function
Overview:

The ‘ret’ instruction is used to return control flow (and optionallya value) from a function back to the caller.

There are two forms of the ‘ret’ instruction: one that returns avalue and then causes control flow, and one that just causes controlflow to occur.

Arguments:

The ‘ret’ instruction optionally accepts a single argument, thereturn value. The type of the return value must be a ‘firstclass’ type.

A function is not well formed if it has a non-voidreturn type and contains a ‘ret’ instruction with no return value ora return value with a type that does not match its type, or if it has avoid return type and contains a ‘ret’ instruction with a returnvalue.

Semantics:

When the ‘ret’ instruction is executed, control flow returns back tothe calling function’s context. If the caller is a“call” instruction, execution continues at theinstruction after the call. If the caller was an“invoke” instruction, execution continues at thebeginning of the “normal” destination block. If the instruction returnsa value, that value shall set the call or invoke instruction’s returnvalue.

Example:
ret i32 5                       ; Return an integer value of 5
ret void                        ; Return from a void function
ret { i32, i8 } { i32 4, i8 2 } ; Return a struct of values 4 and 2

‘br’ Instruction

Syntax:
br i1 <cond>, label <iftrue>, label <iffalse>
br label <dest>          ; Unconditional branch
Overview:

The ‘br’ instruction is used to cause control flow to transfer to adifferent basic block in the current function. There are two forms ofthis instruction, corresponding to a conditional branch and anunconditional branch.

Arguments:

The conditional branch form of the ‘br’ instruction takes a single‘i1’ value and two ‘label’ values. The unconditional form of the‘br’ instruction takes a single ‘label’ value as a target.

Semantics:

Upon execution of a conditional ‘br’ instruction, the ‘i1’argument is evaluated. If the value is true, control flows to the‘iftruelabel argument. If “cond” is false, control flowsto the ‘iffalselabel argument.If ‘cond’ is poison, this instruction has undefined behavior.

Example:
Test:
  %cond = icmp eq i32 %a, %b
  br i1 %cond, label %IfEqual, label %IfUnequal
IfEqual:
  ret i32 1
IfUnequal:
  ret i32 0

‘switch’ Instruction

Syntax:
switch <intty> <value>, label <defaultdest> [ <intty> <val>, label <dest> ... ]
Overview:

The ‘switch’ instruction is used to transfer control flow to one ofseveral different places. It is a generalization of the ‘br’instruction, allowing a branch to occur to one of many possibledestinations.

Arguments:

The ‘switch’ instruction uses three parameters: an integercomparison value ‘value’, a default ‘label’ destination, and anarray of pairs of comparison value constants and ‘label’s. The tableis not allowed to contain duplicate constant entries.

Semantics:

The switch instruction specifies a table of values and destinations.When the ‘switch’ instruction is executed, this table is searchedfor the given value. If the value is found, control flow is transferredto the corresponding destination; otherwise, control flow is transferredto the default destination.If ‘value’ is poison, this instruction has undefined behavior.

Implementation:

Depending on properties of the target machine and the particularswitch instruction, this instruction may be code generated indifferent ways. For example, it could be generated as a series ofchained conditional branches or with a lookup table.

Example:
; Emulate a conditional br instruction
%Val = zext i1 %value to i32
switch i32 %Val, label %truedest [ i32 0, label %falsedest ]

; Emulate an unconditional br instruction
switch i32 0, label %dest [ ]

; Implement a jump table:
switch i32 %val, label %otherwise [ i32 0, label %onzero
                                    i32 1, label %onone
                                    i32 2, label %ontwo ]

‘indirectbr’ Instruction

Syntax:
indirectbr <somety>* <address>, [ label <dest1>, label <dest2>, ... ]
Overview:

The ‘indirectbr’ instruction implements an indirect branch to alabel within the current function, whose address is specified by“address”. Address must be derived from ablockaddress constant.

Arguments:

The ‘address’ argument is the address of the label to jump to. Therest of the arguments indicate the full set of possible destinationsthat the address may point to. Blocks are allowed to occur multipletimes in the destination list, though this isn’t particularly useful.

This destination list is required so that dataflow analysis has anaccurate understanding of the CFG.

Semantics:

Control transfers to the block specified in the address argument. Allpossible destination blocks must be listed in the label list, otherwisethis instruction has undefined behavior. This implies that jumps tolabels defined in other functions have undefined behavior as well.If ‘address’ is poison, this instruction has undefined behavior.

Implementation:

This is typically implemented with a jump through a register.

Example:
indirectbr i8* %Addr, [ label %bb1, label %bb2, label %bb3 ]

‘invoke’ Instruction

Syntax:
<result> = invoke [cconv] [ret attrs] [addrspace(<num>)] <ty>|<fnty> <fnptrval>(<function args>) [fn attrs]
              [operand bundles] to label <normal label> unwind label <exception label>
Overview:

The ‘invoke’ instruction causes control to transfer to a specifiedfunction, with the possibility of control flow transfer to either the‘normal’ label or the ‘exception’ label. If the callee functionreturns with the “ret” instruction, control flow will return to the“normal” label. If the callee (or any indirect callees) returns via the“resume” instruction or other exception handlingmechanism, control is interrupted and continued at the dynamicallynearest “exception” label.

The ‘exception’ label is a landingpad for the exception. As such,‘exception’ label is required to have the“landingpad” instruction, which contains theinformation about the behavior of the program after unwinding happens,as its first non-PHI instruction. The restrictions on the“landingpad” instruction’s tightly couples it to the “invoke”instruction, so that the important information contained within the“landingpad” instruction can’t be lost through normal code motion.

Arguments:

This instruction requires several arguments:

  • The optional “cconv” marker indicates which callingconvention the call should use. If none isspecified, the call defaults to using C calling conventions.
  • The optional Parameter Attributes list for returnvalues. Only ‘zeroext’, ‘signext’, and ‘inreg’ attributesare valid here.
  • The optional addrspace attribute can be used to indicate the address spaceof the called function. If it is not specified, the program address spacefrom the datalayout string will be used.
  • ty’: the type of the call instruction itself which is also thetype of the return value. Functions that return no value are markedvoid.
  • fnty’: shall be the signature of the function being invoked. Theargument types must match the types implied by this signature. Thistype can be omitted if the function is not varargs.
  • fnptrval’: An LLVM value containing a pointer to a function tobe invoked. In most cases, this is a direct function invocation, butindirect invoke’s are just as possible, calling an arbitrary pointerto function value.
  • function args’: argument list whose types match the functionsignature argument types and parameter attributes. All arguments mustbe of first class type. If the function signatureindicates the function accepts a variable number of arguments, theextra arguments can be specified.
  • normal label’: the label reached when the called functionexecutes a ‘ret’ instruction.
  • exception label’: the label reached when a callee returns viathe resume instruction or other exception handlingmechanism.
  • The optional function attributes list.
  • The optional operand bundles list.
Semantics:

This instruction is designed to operate as a standard ‘call’instruction in most regards. The primary difference is that itestablishes an association with a label, which is used by the runtimelibrary to unwind the stack.

This instruction is used in languages with destructors to ensure thatproper cleanup is performed in the case of either a longjmp or athrown exception. Additionally, this is important for implementation of‘catch’ clauses in high-level languages that support them.

For the purposes of the SSA form, the definition of the value returnedby the ‘invoke’ instruction is deemed to occur on the edge from thecurrent block to the “normal” label. If the callee unwinds then noreturn value is available.

Example:
%retval = invoke i32 @Test(i32 15) to label %Continue
            unwind label %TestCleanup              ; i32:retval set
%retval = invoke coldcc i32 %Testfnptr(i32 15) to label %Continue
            unwind label %TestCleanup              ; i32:retval set

‘callbr’ Instruction

Syntax:
<result> = callbr [cconv] [ret attrs] [addrspace(<num>)] <ty>|<fnty> <fnptrval>(<function args>) [fn attrs]
              [operand bundles] to label <fallthrough label> [indirect labels]
Overview:

The ‘callbr’ instruction causes control to transfer to a specifiedfunction, with the possibility of control flow transfer to either the‘fallthrough’ label or one of the ‘indirect’ labels.

This instruction should only be used to implement the “goto” feature of gccstyle inline assembly. Any other usage is an error in the IR verifier.

Arguments:

This instruction requires several arguments:

  • The optional “cconv” marker indicates which callingconvention the call should use. If none isspecified, the call defaults to using C calling conventions.
  • The optional Parameter Attributes list for returnvalues. Only ‘zeroext’, ‘signext’, and ‘inreg’ attributesare valid here.
  • The optional addrspace attribute can be used to indicate the address spaceof the called function. If it is not specified, the program address spacefrom the datalayout string will be used.
  • ty’: the type of the call instruction itself which is also thetype of the return value. Functions that return no value are markedvoid.
  • fnty’: shall be the signature of the function being called. Theargument types must match the types implied by this signature. Thistype can be omitted if the function is not varargs.
  • fnptrval’: An LLVM value containing a pointer to a function tobe called. In most cases, this is a direct function call, butother callbr’s are just as possible, calling an arbitrary pointerto function value.
  • function args’: argument list whose types match the functionsignature argument types and parameter attributes. All arguments mustbe of first class type. If the function signatureindicates the function accepts a variable number of arguments, theextra arguments can be specified.
  • fallthrough label’: the label reached when the inline assembly’sexecution exits the bottom.
  • indirect labels’: the labels reached when a callee transfers controlto a location other than the ‘fallthrough label’. The blockaddressconstant for these should also be in the list of ‘function args’.
  • The optional function attributes list.
  • The optional operand bundles list.
Semantics:

This instruction is designed to operate as a standard ‘call’instruction in most regards. The primary difference is that itestablishes an association with additional labels to define where controlflow goes after the call.

Outputs of a ‘callbr’ instruction are valid only on the ‘fallthrough’path. Use of outputs on the ‘indirect’ path(s) results in poisonvalues.

The only use of this today is to implement the “goto” feature of gcc inlineassembly where additional labels can be provided as locations for the inlineassembly to jump to.

Example:
; "asm goto" without output constraints.
callbr void asm "", "r,X"(i32 %x, i8 *blockaddress(@foo, %indirect))
            to label %fallthrough [label %indirect]

; "asm goto" with output constraints.
<result> = callbr i32 asm "", "=r,r,X"(i32 %x, i8 *blockaddress(@foo, %indirect))
            to label %fallthrough [label %indirect]

‘resume’ Instruction

Syntax:
resume <type> <value>
Overview:

The ‘resume’ instruction is a terminator instruction that has nosuccessors.

Arguments:

The ‘resume’ instruction requires one argument, which must have thesame type as the result of any ‘landingpad’ instruction in the samefunction.

Semantics:

The ‘resume’ instruction resumes propagation of an existing(in-flight) exception whose unwinding was interrupted with alandingpad instruction.

Example:
resume { i8*, i32 } %exn

‘catchswitch’ Instruction

Syntax:
<resultval> = catchswitch within <parent> [ label <handler1>, label <handler2>, ... ] unwind to caller
<resultval> = catchswitch within <parent> [ label <handler1>, label <handler2>, ... ] unwind label <default>
Overview:

The ‘catchswitch’ instruction is used by LLVM’s exception handling system to describe the set of possible catch handlersthat may be executed by the EH personality routine.

Arguments:

The parent argument is the token of the funclet that contains thecatchswitch instruction. If the catchswitch is not inside a funclet,this operand may be the token none.

The default argument is the label of another basic block beginning witheither a cleanuppad or catchswitch instruction. This unwind destinationmust be a legal target with respect to the parent links, as described inthe exception handling documentation.

The handlers are a nonempty list of successor blocks that each begin with acatchpad instruction.

Semantics:

Executing this instruction transfers control to one of the successors inhandlers, if appropriate, or continues to unwind via the unwind label ifpresent.

The catchswitch is both a terminator and a “pad” instruction, meaning thatit must be both the first non-phi instruction and last instruction in the basicblock. Therefore, it must be the only non-phi instruction in the block.

Example:
dispatch1:
  %cs1 = catchswitch within none [label %handler0, label %handler1] unwind to caller
dispatch2:
  %cs2 = catchswitch within %parenthandler [label %handler0] unwind label %cleanup

‘catchret’ Instruction

Syntax:
catchret from <token> to label <normal>
Overview:

The ‘catchret’ instruction is a terminator instruction that has asingle successor.

Arguments:

The first argument to a ‘catchret’ indicates which catchpad itexits. It must be a catchpad.The second argument to a ‘catchret’ specifies where control willtransfer to next.

Semantics:

The ‘catchret’ instruction ends an existing (in-flight) exception whoseunwinding was interrupted with a catchpad instruction. Thepersonality function gets a chance to execute arbitrarycode to, for example, destroy the active exception. Control then transfers tonormal.

The token argument must be a token produced by a catchpad instruction.If the specified catchpad is not the most-recently-entered not-yet-exitedfunclet pad (as described in the EH documentation),the catchret’s behavior is undefined.

Example:
catchret from %catch label %continue

‘cleanupret’ Instruction

Syntax:
cleanupret from <value> unwind label <continue>
cleanupret from <value> unwind to caller
Overview:

The ‘cleanupret’ instruction is a terminator instruction that hasan optional successor.

Arguments:

The ‘cleanupret’ instruction requires one argument, which indicateswhich cleanuppad it exits, and must be a cleanuppad.If the specified cleanuppad is not the most-recently-entered not-yet-exitedfunclet pad (as described in the EH documentation),the cleanupret’s behavior is undefined.

The ‘cleanupret’ instruction also has an optional successor, continue,which must be the label of another basic block beginning with either acleanuppad or catchswitch instruction. This unwind destination mustbe a legal target with respect to the parent links, as described in theexception handling documentation.

Semantics:

The ‘cleanupret’ instruction indicates to thepersonality function that onecleanuppad it transferred control to has ended.It transfers control to continue or unwinds out of the function.

Example:
cleanupret from %cleanup unwind to caller
cleanupret from %cleanup unwind label %continue

‘unreachable’ Instruction

Syntax:
unreachable
Overview:

The ‘unreachable’ instruction has no defined semantics. Thisinstruction is used to inform the optimizer that a particular portion ofthe code is not reachable. This can be used to indicate that the codeafter a no-return function cannot be reached, and other facts.

Semantics:

The ‘unreachable’ instruction has no defined semantics.

Unary Operations

Unary operators require a single operand, execute an operation onit, and produce a single value. The operand might represent multipledata, as is the case with the vector data type. Theresult value has the same type as its operand.

‘fneg’ Instruction

Syntax:
<result> = fneg [fast-math flags]* <ty> <op1>   ; yields ty:result
Overview:

The ‘fneg’ instruction returns the negation of its operand.

Arguments:

The argument to the ‘fneg’ instruction must be afloating-point or vector offloating-point values.

Semantics:

The value produced is a copy of the operand with its sign bit flipped.This instruction can also take any number of fast-mathflags, which are optimization hints to enable otherwiseunsafe floating-point optimizations:

Example:
<result> = fneg float %val          ; yields float:result = -%var

Binary Operations

Binary operators are used to do most of the computation in a program.They require two operands of the same type, execute an operation onthem, and produce a single value. The operands might represent multipledata, as is the case with the vector data type. Theresult value has the same type as its operands.

There are several different binary operators:

‘add’ Instruction

Syntax:
<result> = add <ty> <op1>, <op2>          ; yields ty:result
<result> = add nuw <ty> <op1>, <op2>      ; yields ty:result
<result> = add nsw <ty> <op1>, <op2>      ; yields ty:result
<result> = add nuw nsw <ty> <op1>, <op2>  ; yields ty:result
Overview:

The ‘add’ instruction returns the sum of its two operands.

Arguments:

The two arguments to the ‘add’ instruction must beinteger or vector of integer values. Botharguments must have identical types.

Semantics:

The value produced is the integer sum of the two operands.

If the sum has unsigned overflow, the result returned is themathematical result modulo 2n, where n is the bit width ofthe result.

Because LLVM integers use a two’s complement representation, thisinstruction is appropriate for both signed and unsigned integers.

nuw and nsw stand for “No Unsigned Wrap” and “No Signed Wrap”,respectively. If the nuw and/or nsw keywords are present, theresult value of the add is a poison value ifunsigned and/or signed overflow, respectively, occurs.

Example:
<result> = add i32 4, %var          ; yields i32:result = 4 + %var

‘fadd’ Instruction

Syntax:
<result> = fadd [fast-math flags]* <ty> <op1>, <op2>   ; yields ty:result
Overview:

The ‘fadd’ instruction returns the sum of its two operands.

Arguments:

The two arguments to the ‘fadd’ instruction must befloating-point or vector offloating-point values. Both arguments must have identical types.

Semantics:

The value produced is the floating-point sum of the two operands.This instruction is assumed to execute in the default floating-pointenvironment.This instruction can also take any number of fast-mathflags, which are optimization hints to enable otherwiseunsafe floating-point optimizations:

Example:
<result> = fadd float 4.0, %var          ; yields float:result = 4.0 + %var

‘sub’ Instruction

Syntax:
<result> = sub <ty> <op1>, <op2>          ; yields ty:result
<result> = sub nuw <ty> <op1>, <op2>      ; yields ty:result
<result> = sub nsw <ty> <op1>, <op2>      ; yields ty:result
<result> = sub nuw nsw <ty> <op1>, <op2>  ; yields ty:result
Overview:

The ‘sub’ instruction returns the difference of its two operands.

Note that the ‘sub’ instruction is used to represent the ‘neg’instruction present in most other intermediate representations.

Arguments:

The two arguments to the ‘sub’ instruction must beinteger or vector of integer values. Botharguments must have identical types.

Semantics:

The value produced is the integer difference of the two operands.

If the difference has unsigned overflow, the result returned is themathematical result modulo 2n, where n is the bit width ofthe result.

Because LLVM integers use a two’s complement representation, thisinstruction is appropriate for both signed and unsigned integers.

nuw and nsw stand for “No Unsigned Wrap” and “No Signed Wrap”,respectively. If the nuw and/or nsw keywords are present, theresult value of the sub is a poison value ifunsigned and/or signed overflow, respectively, occurs.

Example:
<result> = sub i32 4, %var          ; yields i32:result = 4 - %var
<result> = sub i32 0, %val          ; yields i32:result = -%var

‘fsub’ Instruction

Syntax:
<result> = fsub [fast-math flags]* <ty> <op1>, <op2>   ; yields ty:result
Overview:

The ‘fsub’ instruction returns the difference of its two operands.

Arguments:

The two arguments to the ‘fsub’ instruction must befloating-point or vector offloating-point values. Both arguments must have identical types.

Semantics:

The value produced is the floating-point difference of the two operands.This instruction is assumed to execute in the default floating-pointenvironment.This instruction can also take any number of fast-mathflags, which are optimization hints to enable otherwiseunsafe floating-point optimizations:

Example:
<result> = fsub float 4.0, %var           ; yields float:result = 4.0 - %var
<result> = fsub float -0.0, %val          ; yields float:result = -%var

‘mul’ Instruction

Syntax:
<result> = mul <ty> <op1>, <op2>          ; yields ty:result
<result> = mul nuw <ty> <op1>, <op2>      ; yields ty:result
<result> = mul nsw <ty> <op1>, <op2>      ; yields ty:result
<result> = mul nuw nsw <ty> <op1>, <op2>  ; yields ty:result
Overview:

The ‘mul’ instruction returns the product of its two operands.

Arguments:

The two arguments to the ‘mul’ instruction must beinteger or vector of integer values. Botharguments must have identical types.

Semantics:

The value produced is the integer product of the two operands.

If the result of the multiplication has unsigned overflow, the resultreturned is the mathematical result modulo 2n, where n is thebit width of the result.

Because LLVM integers use a two’s complement representation, and theresult is the same width as the operands, this instruction returns thecorrect result for both signed and unsigned integers. If a full product(e.g. i32 * i32 -> i64) is needed, the operands should besign-extended or zero-extended as appropriate to the width of the fullproduct.

nuw and nsw stand for “No Unsigned Wrap” and “No Signed Wrap”,respectively. If the nuw and/or nsw keywords are present, theresult value of the mul is a poison value ifunsigned and/or signed overflow, respectively, occurs.

Example:
<result> = mul i32 4, %var          ; yields i32:result = 4 * %var

‘fmul’ Instruction

Syntax:
<result> = fmul [fast-math flags]* <ty> <op1>, <op2>   ; yields ty:result
Overview:

The ‘fmul’ instruction returns the product of its two operands.

Arguments:

The two arguments to the ‘fmul’ instruction must befloating-point or vector offloating-point values. Both arguments must have identical types.

Semantics:

The value produced is the floating-point product of the two operands.This instruction is assumed to execute in the default floating-pointenvironment.This instruction can also take any number of fast-mathflags, which are optimization hints to enable otherwiseunsafe floating-point optimizations:

Example:
<result> = fmul float 4.0, %var          ; yields float:result = 4.0 * %var

‘udiv’ Instruction

Syntax:
<result> = udiv <ty> <op1>, <op2>         ; yields ty:result
<result> = udiv exact <ty> <op1>, <op2>   ; yields ty:result
Overview:

The ‘udiv’ instruction returns the quotient of its two operands.

Arguments:

The two arguments to the ‘udiv’ instruction must beinteger or vector of integer values. Botharguments must have identical types.

Semantics:

The value produced is the unsigned integer quotient of the two operands.

Note that unsigned integer division and signed integer division aredistinct operations; for signed integer division, use ‘sdiv’.

Division by zero is undefined behavior. For vectors, if any elementof the divisor is zero, the operation has undefined behavior.

If the exact keyword is present, the result value of the udiv isa poison value if %op1 is not a multiple of %op2 (assuch, “((a udiv exact b) mul b) == a”).

Example:
<result> = udiv i32 4, %var          ; yields i32:result = 4 / %var

‘sdiv’ Instruction

Syntax:
<result> = sdiv <ty> <op1>, <op2>         ; yields ty:result
<result> = sdiv exact <ty> <op1>, <op2>   ; yields ty:result
Overview:

The ‘sdiv’ instruction returns the quotient of its two operands.

Arguments:

The two arguments to the ‘sdiv’ instruction must beinteger or vector of integer values. Botharguments must have identical types.

Semantics:

The value produced is the signed integer quotient of the two operandsrounded towards zero.

Note that signed integer division and unsigned integer division aredistinct operations; for unsigned integer division, use ‘udiv’.

Division by zero is undefined behavior. For vectors, if any elementof the divisor is zero, the operation has undefined behavior.Overflow also leads to undefined behavior; this is a rare case, but canoccur, for example, by doing a 32-bit division of -2147483648 by -1.

If the exact keyword is present, the result value of the sdiv isa poison value if the result would be rounded.

Example:
<result> = sdiv i32 4, %var          ; yields i32:result = 4 / %var

‘fdiv’ Instruction

Syntax:
<result> = fdiv [fast-math flags]* <ty> <op1>, <op2>   ; yields ty:result
Overview:

The ‘fdiv’ instruction returns the quotient of its two operands.

Arguments:

The two arguments to the ‘fdiv’ instruction must befloating-point or vector offloating-point values. Both arguments must have identical types.

Semantics:

The value produced is the floating-point quotient of the two operands.This instruction is assumed to execute in the default floating-pointenvironment.This instruction can also take any number of fast-mathflags, which are optimization hints to enable otherwiseunsafe floating-point optimizations:

Example:
<result> = fdiv float 4.0, %var          ; yields float:result = 4.0 / %var

‘urem’ Instruction

Syntax:
<result> = urem <ty> <op1>, <op2>   ; yields ty:result
Overview:

The ‘urem’ instruction returns the remainder from the unsigneddivision of its two arguments.

Arguments:

The two arguments to the ‘urem’ instruction must beinteger or vector of integer values. Botharguments must have identical types.

Semantics:

This instruction returns the unsigned integer remainder of a division.This instruction always performs an unsigned division to get theremainder.

Note that unsigned integer remainder and signed integer remainder aredistinct operations; for signed integer remainder, use ‘srem’.

Taking the remainder of a division by zero is undefined behavior.For vectors, if any element of the divisor is zero, the operation hasundefined behavior.

Example:
<result> = urem i32 4, %var          ; yields i32:result = 4 % %var

‘srem’ Instruction

Syntax:
<result> = srem <ty> <op1>, <op2>   ; yields ty:result
Overview:

The ‘srem’ instruction returns the remainder from the signeddivision of its two operands. This instruction can also takevector versions of the values in which case the elementsmust be integers.

Arguments:

The two arguments to the ‘srem’ instruction must beinteger or vector of integer values. Botharguments must have identical types.

Semantics:

This instruction returns the remainder of a division (where the resultis either zero or has the same sign as the dividend, op1), not themodulo operator (where the result is either zero or has the same signas the divisor, op2) of a value. For more information about thedifference, see The MathForum. For atable of how this is implemented in various languages, please seeWikipedia: modulooperation.

Note that signed integer remainder and unsigned integer remainder aredistinct operations; for unsigned integer remainder, use ‘urem’.

Taking the remainder of a division by zero is undefined behavior.For vectors, if any element of the divisor is zero, the operation hasundefined behavior.Overflow also leads to undefined behavior; this is a rare case, but canoccur, for example, by taking the remainder of a 32-bit division of-2147483648 by -1. (The remainder doesn’t actually overflow, but thisrule lets srem be implemented using instructions that return both theresult of the division and the remainder.)

Example:
<result> = srem i32 4, %var          ; yields i32:result = 4 % %var

‘frem’ Instruction

Syntax:
<result> = frem [fast-math flags]* <ty> <op1>, <op2>   ; yields ty:result
Overview:

The ‘frem’ instruction returns the remainder from the division ofits two operands.

Arguments:

The two arguments to the ‘frem’ instruction must befloating-point or vector offloating-point values. Both arguments must have identical types.

Semantics:

The value produced is the floating-point remainder of the two operands.This is the same output as a libm ‘fmod’ function, but without anypossibility of setting errno. The remainder has the same sign as thedividend.This instruction is assumed to execute in the default floating-pointenvironment.This instruction can also take any number of fast-mathflags, which are optimization hints to enable otherwiseunsafe floating-point optimizations:

Example:
<result> = frem float 4.0, %var          ; yields float:result = 4.0 % %var

Bitwise Binary Operations

Bitwise binary operators are used to do various forms of bit-twiddlingin a program. They are generally very efficient instructions and cancommonly be strength reduced from other instructions. They require twooperands of the same type, execute an operation on them, and produce asingle value. The resulting value is the same type as its operands.

‘shl’ Instruction

Syntax:
<result> = shl <ty> <op1>, <op2>           ; yields ty:result
<result> = shl nuw <ty> <op1>, <op2>       ; yields ty:result
<result> = shl nsw <ty> <op1>, <op2>       ; yields ty:result
<result> = shl nuw nsw <ty> <op1>, <op2>   ; yields ty:result
Overview:

The ‘shl’ instruction returns the first operand shifted to the lefta specified number of bits.

Arguments:

Both arguments to the ‘shl’ instruction must be the sameinteger or vector of integer type.‘op2’ is treated as an unsigned value.

Semantics:

The value produced is op1 * 2op2 mod 2n,where n is the width of the result. If op2 is (statically ordynamically) equal to or larger than the number of bits inop1, this instruction returns a poison value.If the arguments are vectors, each vector element of op1 is shiftedby the corresponding shift amount in op2.

If the nuw keyword is present, then the shift produces a poisonvalue if it shifts out any non-zero bits.If the nsw keyword is present, then the shift produces a poisonvalue if it shifts out any bits that disagree with the resultant sign bit.

Example:
<result> = shl i32 4, %var   ; yields i32: 4 << %var
<result> = shl i32 4, 2      ; yields i32: 16
<result> = shl i32 1, 10     ; yields i32: 1024
<result> = shl i32 1, 32     ; undefined
<result> = shl <2 x i32> < i32 1, i32 1>, < i32 1, i32 2>   ; yields: result=<2 x i32> < i32 2, i32 4>

‘lshr’ Instruction

Syntax:
<result> = lshr <ty> <op1>, <op2>         ; yields ty:result
<result> = lshr exact <ty> <op1>, <op2>   ; yields ty:result
Overview:

The ‘lshr’ instruction (logical shift right) returns the firstoperand shifted to the right a specified number of bits with zero fill.

Arguments:

Both arguments to the ‘lshr’ instruction must be the sameinteger or vector of integer type.‘op2’ is treated as an unsigned value.

Semantics:

This instruction always performs a logical shift right operation. Themost significant bits of the result will be filled with zero bits afterthe shift. If op2 is (statically or dynamically) equal to or largerthan the number of bits in op1, this instruction returns a poisonvalue. If the arguments are vectors, each vector elementof op1 is shifted by the corresponding shift amount in op2.

If the exact keyword is present, the result value of the lshr isa poison value if any of the bits shifted out are non-zero.

Example:
<result> = lshr i32 4, 1   ; yields i32:result = 2
<result> = lshr i32 4, 2   ; yields i32:result = 1
<result> = lshr i8  4, 3   ; yields i8:result = 0
<result> = lshr i8 -2, 1   ; yields i8:result = 0x7F
<result> = lshr i32 1, 32  ; undefined
<result> = lshr <2 x i32> < i32 -2, i32 4>, < i32 1, i32 2>   ; yields: result=<2 x i32> < i32 0x7FFFFFFF, i32 1>

‘ashr’ Instruction

Syntax:
<result> = ashr <ty> <op1>, <op2>         ; yields ty:result
<result> = ashr exact <ty> <op1>, <op2>   ; yields ty:result
Overview:

The ‘ashr’ instruction (arithmetic shift right) returns the firstoperand shifted to the right a specified number of bits with signextension.

Arguments:

Both arguments to the ‘ashr’ instruction must be the sameinteger or vector of integer type.‘op2’ is treated as an unsigned value.

Semantics:

This instruction always performs an arithmetic shift right operation,The most significant bits of the result will be filled with the sign bitof op1. If op2 is (statically or dynamically) equal to or largerthan the number of bits in op1, this instruction returns a poisonvalue. If the arguments are vectors, each vector elementof op1 is shifted by the corresponding shift amount in op2.

If the exact keyword is present, the result value of the ashr isa poison value if any of the bits shifted out are non-zero.

Example:
<result> = ashr i32 4, 1   ; yields i32:result = 2
<result> = ashr i32 4, 2   ; yields i32:result = 1
<result> = ashr i8  4, 3   ; yields i8:result = 0
<result> = ashr i8 -2, 1   ; yields i8:result = -1
<result> = ashr i32 1, 32  ; undefined
<result> = ashr <2 x i32> < i32 -2, i32 4>, < i32 1, i32 3>   ; yields: result=<2 x i32> < i32 -1, i32 0>

‘and’ Instruction

Syntax:
<result> = and <ty> <op1>, <op2>   ; yields ty:result
Overview:

The ‘and’ instruction returns the bitwise logical and of its twooperands.

Arguments:

The two arguments to the ‘and’ instruction must beinteger or vector of integer values. Botharguments must have identical types.

Semantics:

The truth table used for the ‘and’ instruction is:

In0In1Out
000
010
100
111
Example:
<result> = and i32 4, %var         ; yields i32:result = 4 & %var
<result> = and i32 15, 40          ; yields i32:result = 8
<result> = and i32 4, 8            ; yields i32:result = 0

‘or’ Instruction

Syntax:
<result> = or <ty> <op1>, <op2>   ; yields ty:result
Overview:

The ‘or’ instruction returns the bitwise logical inclusive or of itstwo operands.

Arguments:

The two arguments to the ‘or’ instruction must beinteger or vector of integer values. Botharguments must have identical types.

Semantics:

The truth table used for the ‘or’ instruction is:

In0In1Out
000
011
101
111
Example:
<result> = or i32 4, %var         ; yields i32:result = 4 | %var
<result> = or i32 15, 40          ; yields i32:result = 47
<result> = or i32 4, 8            ; yields i32:result = 12

‘xor’ Instruction

Syntax:
<result> = xor <ty> <op1>, <op2>   ; yields ty:result
Overview:

The ‘xor’ instruction returns the bitwise logical exclusive or ofits two operands. The xor is used to implement the “one’scomplement” operation, which is the “~” operator in C.

Arguments:

The two arguments to the ‘xor’ instruction must beinteger or vector of integer values. Botharguments must have identical types.

Semantics:

The truth table used for the ‘xor’ instruction is:

In0In1Out
000
011
101
110
Example:
<result> = xor i32 4, %var         ; yields i32:result = 4 ^ %var
<result> = xor i32 15, 40          ; yields i32:result = 39
<result> = xor i32 4, 8            ; yields i32:result = 12
<result> = xor i32 %V, -1          ; yields i32:result = ~%V

Vector Operations

LLVM supports several instructions to represent vector operations in atarget-independent manner. These instructions cover the element-accessand vector-specific operations needed to process vectors effectively.While LLVM does directly support these vector operations, manysophisticated algorithms will want to use target-specific intrinsics totake full advantage of a specific target.

‘extractelement’ Instruction

Syntax:
<result> = extractelement <n x <ty>> <val>, <ty2> <idx>  ; yields <ty>
<result> = extractelement <vscale x n x <ty>> <val>, <ty2> <idx> ; yields <ty>
Overview:

The ‘extractelement’ instruction extracts a single scalar elementfrom a vector at a specified index.

Arguments:

The first operand of an ‘extractelement’ instruction is a value ofvector type. The second operand is an index indicatingthe position from which to extract the element. The index may be avariable of any integer type.

Semantics:

The result is a scalar of the same type as the element type of val.Its value is the value at position idx of val. If idxexceeds the length of val for a fixed-length vector, the result is apoison value. For a scalable vector, if the valueof idx exceeds the runtime length of the vector, the result is apoison value.

Example:
<result> = extractelement <4 x i32> %vec, i32 0    ; yields i32

‘insertelement’ Instruction

Syntax:
<result> = insertelement <n x <ty>> <val>, <ty> <elt>, <ty2> <idx>    ; yields <n x <ty>>
<result> = insertelement <vscale x n x <ty>> <val>, <ty> <elt>, <ty2> <idx> ; yields <vscale x n x <ty>>
Overview:

The ‘insertelement’ instruction inserts a scalar element into avector at a specified index.

Arguments:

The first operand of an ‘insertelement’ instruction is a value ofvector type. The second operand is a scalar value whosetype must equal the element type of the first operand. The third operandis an index indicating the position at which to insert the value. Theindex may be a variable of any integer type.

Semantics:

The result is a vector of the same type as val. Its element valuesare those of val except at position idx, where it gets the valueelt. If idx exceeds the length of val for a fixed-length vector,the result is a poison value. For a scalable vector,if the value of idx exceeds the runtime length of the vector, the resultis a poison value.

Example:
<result> = insertelement <4 x i32> %vec, i32 1, i32 0    ; yields <4 x i32>

‘shufflevector’ Instruction

Syntax:
<result> = shufflevector <n x <ty>> <v1>, <n x <ty>> <v2>, <m x i32> <mask>    ; yields <m x <ty>>
<result> = shufflevector <vscale x n x <ty>> <v1>, <vscale x n x <ty>> v2, <vscale x m x i32> <mask>  ; yields <vscale x m x <ty>>
Overview:

The ‘shufflevector’ instruction constructs a permutation of elementsfrom two input vectors, returning a vector with the same element type asthe input and length that is the same as the shuffle mask.

Arguments:

The first two operands of a ‘shufflevector’ instruction are vectorswith the same type. The third argument is a shuffle mask whose elementtype is always ‘i32’. The result of the instruction is a vector whoselength is the same as the shuffle mask and whose element type is thesame as the element type of the first two operands.

The shuffle mask operand is required to be a constant vector with eitherconstant integer or undef values.

Semantics:

The elements of the two input vectors are numbered from left to rightacross both of the vectors. The shuffle mask operand specifies, for eachelement of the result vector, which element of the two input vectors theresult element gets.

If the shuffle mask is undef, the result vector is undef. If any elementof the mask operand is undef, that element of the result is undef. If theshuffle mask selects an undef element from one of the input vectors, theresulting element is undef. An undef mask element prevents a poisonedvector element from propagating.

For scalable vectors, the only valid mask values at present arezeroinitializer and undef, since we cannot write all indices asliterals for a vector with a length unknown at compile time.

Example:
<result> = shufflevector <4 x i32> %v1, <4 x i32> %v2,
                        <4 x i32> <i32 0, i32 4, i32 1, i32 5>  ; yields <4 x i32>
<result> = shufflevector <4 x i32> %v1, <4 x i32> undef,
                        <4 x i32> <i32 0, i32 1, i32 2, i32 3>  ; yields <4 x i32> - Identity shuffle.
<result> = shufflevector <8 x i32> %v1, <8 x i32> undef,
                        <4 x i32> <i32 0, i32 1, i32 2, i32 3>  ; yields <4 x i32>
<result> = shufflevector <4 x i32> %v1, <4 x i32> %v2,
                        <8 x i32> <i32 0, i32 1, i32 2, i32 3, i32 4, i32 5, i32 6, i32 7 >  ; yields <8 x i32>

Aggregate Operations

LLVM supports several instructions for working withaggregate values.

‘extractvalue’ Instruction

Syntax:
<result> = extractvalue <aggregate type> <val>, <idx>{, <idx>}*
Overview:

The ‘extractvalue’ instruction extracts the value of a member fieldfrom an aggregate value.

Arguments:

The first operand of an ‘extractvalue’ instruction is a value ofstruct or array type. The other operands areconstant indices to specify which value to extract in a similar manneras indices in a ‘getelementptr’ instruction.

The major differences to getelementptr indexing are:

  • Since the value being indexed is not a pointer, the first index isomitted and assumed to be zero.
  • At least one index must be specified.
  • Not only struct indices but also array indices must be in bounds.
Semantics:

The result is the value at the position in the aggregate specified bythe index operands.

Example:
<result> = extractvalue {i32, float} %agg, 0    ; yields i32

‘insertvalue’ Instruction

Syntax:
<result> = insertvalue <aggregate type> <val>, <ty> <elt>, <idx>{, <idx>}*    ; yields <aggregate type>
Overview:

The ‘insertvalue’ instruction inserts a value into a member field inan aggregate value.

Arguments:

The first operand of an ‘insertvalue’ instruction is a value ofstruct or array type. The second operand isa first-class value to insert. The following operands are constantindices indicating the position at which to insert the value in asimilar manner as indices in a ‘extractvalue’ instruction. The valueto insert must have the same type as the value identified by theindices.

Semantics:

The result is an aggregate of the same type as val. Its value isthat of val except that the value at the position specified by theindices is that of elt.

Example:
%agg1 = insertvalue {i32, float} undef, i32 1, 0              ; yields {i32 1, float undef}
%agg2 = insertvalue {i32, float} %agg1, float %val, 1         ; yields {i32 1, float %val}
%agg3 = insertvalue {i32, {float}} undef, float %val, 1, 0    ; yields {i32 undef, {float %val}}

Memory Access and Addressing Operations

A key design point of an SSA-based representation is how it representsmemory. In LLVM, no memory locations are in SSA form, which makes thingsvery simple. This section describes how to read, write, and allocatememory in LLVM.

‘alloca’ Instruction

Syntax:
<result> = alloca [inalloca] <type> [, <ty> <NumElements>] [, align <alignment>] [, addrspace(<num>)]     ; yields type addrspace(num)*:result
Overview:

The ‘alloca’ instruction allocates memory on the stack frame of thecurrently executing function, to be automatically released when thisfunction returns to its caller. The object is always allocated in theaddress space for allocas indicated in the datalayout.

Arguments:

The ‘alloca’ instruction allocates sizeof(<type>)*NumElementsbytes of memory on the runtime stack, returning a pointer of theappropriate type to the program. If “NumElements” is specified, it isthe number of elements allocated, otherwise “NumElements” is defaultedto be one. If a constant alignment is specified, the value result of theallocation is guaranteed to be aligned to at least that boundary. Thealignment may not be greater than 1 << 29. If not specified, or ifzero, the target can choose to align the allocation on any convenientboundary compatible with the type.

type’ may be any sized type.

Semantics:

Memory is allocated; a pointer is returned. The allocated memory isuninitialized, and loading from uninitialized memory produces an undefinedvalue. The operation itself is undefined if there is insufficient stackspace for the allocation.’alloca’d memory is automatically releasedwhen the function returns. The ‘alloca’ instruction is commonly usedto represent automatic variables that must have an address available. Whenthe function returns (either with the ret or resume instructions),the memory is reclaimed. Allocating zero bytes is legal, but the returnedpointer may not be unique. The order in which memory is allocated (ie.,which way the stack grows) is not specified.

Example:
%ptr = alloca i32                             ; yields i32*:ptr
%ptr = alloca i32, i32 4                      ; yields i32*:ptr
%ptr = alloca i32, i32 4, align 1024          ; yields i32*:ptr
%ptr = alloca i32, align 1024                 ; yields i32*:ptr

‘load’ Instruction

Syntax:
<result> = load [volatile] <ty>, <ty>* <pointer>[, align <alignment>][, !nontemporal !<index>][, !invariant.load !<index>][, !invariant.group !<index>][, !nonnull !<index>][, !dereferenceable !<deref_bytes_node>][, !dereferenceable_or_null !<deref_bytes_node>][, !align !<align_node>]
<result> = load atomic [volatile] <ty>, <ty>* <pointer> [syncscope("<target-scope>")] <ordering>, align <alignment> [, !invariant.group !<index>]
!<index> = !{ i32 1 }
!<deref_bytes_node> = !{i64 <dereferenceable_bytes>}
!<align_node> = !{ i64 <value_alignment> }
Overview:

The ‘load’ instruction is used to read from memory.

Arguments:

The argument to the load instruction specifies the memory address from whichto load. The type specified must be a first class type ofknown size (i.e. not containing an opaque structural type). Ifthe load is marked as volatile, then the optimizer is not allowed tomodify the number or order of execution of this load with othervolatile operations.

If the load is marked as atomic, it takes an extra ordering and optional syncscope("<target-scope>") argument. Therelease and acq_rel orderings are not valid on load instructions.Atomic loads produce defined results when they may seemultiple atomic stores. The type of the pointee must be an integer, pointer, orfloating-point type whose bit width is a power of two greater than or equal toeight and less than or equal to a target-specific size limit. align must beexplicitly specified on atomic loads, and the load has undefined behavior if thealignment is not set to a value which is at least the size in bytes of thepointee. !nontemporal does not have any defined semantics for atomic loads.

The optional constant align argument specifies the alignment of theoperation (that is, the alignment of the memory address). A value of 0or an omitted align argument means that the operation has the ABIalignment for the target. It is the responsibility of the code emitterto ensure that the alignment information is correct. Overestimating thealignment results in undefined behavior. Underestimating the alignmentmay produce less efficient code. An alignment of 1 is always safe. Themaximum possible alignment is 1 << 29. An alignment value higherthan the size of the loaded type implies memory up to the alignmentvalue bytes can be safely loaded without trapping in the defaultaddress space. Access of the high bytes can interfere with debuggingtools, so should not be accessed if the function has thesanitize_thread or sanitize_address attributes.

The optional !nontemporal metadata must reference a singlemetadata name <index> corresponding to a metadata node with onei32 entry of value 1. The existence of the !nontemporalmetadata on the instruction tells the optimizer and code generatorthat this load is not expected to be reused in the cache. The codegenerator may select special instructions to save cache bandwidth, suchas the MOVNT instruction on x86.

The optional !invariant.load metadata must reference a singlemetadata name <index> corresponding to a metadata node with noentries. If a load instruction tagged with the !invariant.loadmetadata is executed, the optimizer may assume the memory locationreferenced by the load contains the same value at all points in theprogram where the memory location is known to be dereferenceable;otherwise, the behavior is undefined.

  • The optional !invariant.group metadata must reference a single metadata name
  • <index> corresponding to a metadata node with no entries.See invariant.group metadata invariant.group

The optional !nonnull metadata must reference a singlemetadata name <index> corresponding to a metadata node with noentries. The existence of the !nonnull metadata on theinstruction tells the optimizer that the value loaded is known tonever be null. If the value is null at runtime, the behavior is undefined.This is analogous to the nonnull attribute on parameters and returnvalues. This metadata can only be applied to loads of a pointer type.

The optional !dereferenceable metadata must reference a single metadataname <deref_bytes_node> corresponding to a metadata node with one i64entry.See dereferenceable metadata dereferenceable

The optional !dereferenceable_or_null metadata must reference a singlemetadata name <deref_bytes_node> corresponding to a metadata node with onei64 entry.See dereferenceable_or_null metadata dereferenceable_or_null

The optional !align metadata must reference a single metadata name<align_node> corresponding to a metadata node with one i64 entry.The existence of the !align metadata on the instruction tells theoptimizer that the value loaded is known to be aligned to a boundary specifiedby the integer value in the metadata node. The alignment must be a power of 2.This is analogous to the ‘’align’’ attribute on parameters and return values.This metadata can only be applied to loads of a pointer type. If the returnedvalue is not appropriately aligned at runtime, the behavior is undefined.

Semantics:

The location of memory pointed to is loaded. If the value being loadedis of scalar type then the number of bytes read does not exceed theminimum number of bytes needed to hold all bits of the type. Forexample, loading an i24 reads at most three bytes. When loading avalue of a type like i20 with a size that is not an integral numberof bytes, the result is undefined if the value was not originallywritten using a store of the same type.

Examples:
%ptr = alloca i32                               ; yields i32*:ptr
store i32 3, i32* %ptr                          ; yields void
%val = load i32, i32* %ptr                      ; yields i32:val = i32 3

‘store’ Instruction

Syntax:
store [volatile] <ty> <value>, <ty>* <pointer>[, align <alignment>][, !nontemporal !<index>][, !invariant.group !<index>]        ; yields void
store atomic [volatile] <ty> <value>, <ty>* <pointer> [syncscope("<target-scope>")] <ordering>, align <alignment> [, !invariant.group !<index>] ; yields void
Overview:

The ‘store’ instruction is used to write to memory.

Arguments:

There are two arguments to the store instruction: a value to store and anaddress at which to store it. The type of the <pointer> operand must be apointer to the first class type of the <value>operand. If the store is marked as volatile, then the optimizer is notallowed to modify the number or order of execution of this store with othervolatile operations. Only values of first class types of known size (i.e. not containing an opaquestructural type) can be stored.

If the store is marked as atomic, it takes an extra ordering and optional syncscope("<target-scope>") argument. Theacquire and acq_rel orderings aren’t valid on store instructions.Atomic loads produce defined results when they may seemultiple atomic stores. The type of the pointee must be an integer, pointer, orfloating-point type whose bit width is a power of two greater than or equal toeight and less than or equal to a target-specific size limit. align must beexplicitly specified on atomic stores, and the store has undefined behavior ifthe alignment is not set to a value which is at least the size in bytes of thepointee. !nontemporal does not have any defined semantics for atomic stores.

The optional constant align argument specifies the alignment of theoperation (that is, the alignment of the memory address). A value of 0or an omitted align argument means that the operation has the ABIalignment for the target. It is the responsibility of the code emitterto ensure that the alignment information is correct. Overestimating thealignment results in undefined behavior. Underestimating thealignment may produce less efficient code. An alignment of 1 is alwayssafe. The maximum possible alignment is 1 << 29. An alignmentvalue higher than the size of the stored type implies memory up to thealignment value bytes can be stored to without trapping in the defaultaddress space. Storing to the higher bytes however may result in dataraces if another thread can access the same address. Introducing adata race is not allowed. Storing to the extra bytes is not allowedeven in situations where a data race is known to not exist if thefunction has the sanitize_address attribute.

The optional !nontemporal metadata must reference a single metadataname <index> corresponding to a metadata node with one i32 entry ofvalue 1. The existence of the !nontemporal metadata on the instructiontells the optimizer and code generator that this load is not expected tobe reused in the cache. The code generator may select specialinstructions to save cache bandwidth, such as the MOVNT instruction onx86.

The optional !invariant.group metadata must reference asingle metadata name <index>. See invariant.group metadata.

Semantics:

The contents of memory are updated to contain <value> at thelocation specified by the <pointer> operand. If <value> isof scalar type then the number of bytes written does not exceed theminimum number of bytes needed to hold all bits of the type. Forexample, storing an i24 writes at most three bytes. When writing avalue of a type like i20 with a size that is not an integral numberof bytes, it is unspecified what happens to the extra bits that do notbelong to the type, but they will typically be overwritten.

Example:
%ptr = alloca i32                               ; yields i32*:ptr
store i32 3, i32* %ptr                          ; yields void
%val = load i32, i32* %ptr                      ; yields i32:val = i32 3

‘fence’ Instruction

Syntax:
fence [syncscope("<target-scope>")] <ordering>  ; yields void
Overview:

The ‘fence’ instruction is used to introduce happens-before edgesbetween operations.

Arguments:

fence’ instructions take an ordering argument whichdefines what synchronizes-with edges they add. They can only be givenacquire, release, acq_rel, and seq_cst orderings.

Semantics:

A fence A which has (at least) release ordering semanticssynchronizes with a fence B with (at least) acquire orderingsemantics if and only if there exist atomic operations X and Y, bothoperating on some atomic object M, such that A is sequenced before X, Xmodifies M (either directly or through some side effect of a sequenceheaded by X), Y is sequenced before B, and Y observes M. This provides ahappens-before dependency between A and B. Rather than an explicitfence, one (but not both) of the atomic operations X or Y mightprovide a release or acquire (resp.) ordering constraint andstill synchronize-with the explicit fence and establish thehappens-before edge.

A fence which has seq_cst ordering, in addition to having bothacquire and release semantics specified above, participates inthe global program order of other seq_cst operations and/or fences.

A fence instruction can also take an optional“syncscope” argument.

Example:
fence acquire                                        ; yields void
fence syncscope("singlethread") seq_cst              ; yields void
fence syncscope("agent") seq_cst                     ; yields void

‘cmpxchg’ Instruction

Syntax:
cmpxchg [weak] [volatile] <ty>* <pointer>, <ty> <cmp>, <ty> <new> [syncscope("<target-scope>")] <success ordering> <failure ordering> ; yields  { ty, i1 }
Overview:

The ‘cmpxchg’ instruction is used to atomically modify memory. Itloads a value in memory and compares it to a given value. If they areequal, it tries to store a new value into the memory.

Arguments:

There are three arguments to the ‘cmpxchg’ instruction: an addressto operate on, a value to compare to the value currently be at thataddress, and a new value to place at that address if the compared valuesare equal. The type of ‘<cmp>’ must be an integer or pointer type whosebit width is a power of two greater than or equal to eight and lessthan or equal to a target-specific size limit. ‘<cmp>’ and ‘<new>’ musthave the same type, and the type of ‘<pointer>’ must be a pointer tothat type. If the cmpxchg is marked as volatile, then theoptimizer is not allowed to modify the number or order of execution ofthis cmpxchg with other volatile operations.

The success and failure ordering arguments specify how thiscmpxchg synchronizes with other atomic operations. Both ordering parametersmust be at least monotonic, the ordering constraint on failure must be nostronger than that on success, and the failure ordering cannot be eitherrelease or acq_rel.

A cmpxchg instruction can also take an optional“syncscope” argument.

The pointer passed into cmpxchg must have alignment greater than orequal to the size in memory of the operand.

Semantics:

The contents of memory at the location specified by the ‘<pointer>’ operandis read and compared to ‘<cmp>’; if the values are equal, ‘<new>’ iswritten to the location. The original value at the location is returned,together with a flag indicating success (true) or failure (false).

If the cmpxchg operation is marked as weak then a spurious failure ispermitted: the operation may not write <new> even if the comparisonmatched.

If the cmpxchg operation is strong (the default), the i1 value is 1 if and onlyif the value loaded equals cmp.

A successful cmpxchg is a read-modify-write instruction for the purpose ofidentifying release sequences. A failed cmpxchg is equivalent to an atomicload with an ordering parameter determined the second ordering parameter.

Example:
entry:
  %orig = load atomic i32, i32* %ptr unordered, align 4                      ; yields i32
  br label %loop

loop:
  %cmp = phi i32 [ %orig, %entry ], [%value_loaded, %loop]
  %squared = mul i32 %cmp, %cmp
  %val_success = cmpxchg i32* %ptr, i32 %cmp, i32 %squared acq_rel monotonic ; yields  { i32, i1 }
  %value_loaded = extractvalue { i32, i1 } %val_success, 0
  %success = extractvalue { i32, i1 } %val_success, 1
  br i1 %success, label %done, label %loop

done:
  ...

‘atomicrmw’ Instruction

Syntax:
atomicrmw [volatile] <operation> <ty>* <pointer>, <ty> <value> [syncscope("<target-scope>")] <ordering>                   ; yields ty
Overview:

The ‘atomicrmw’ instruction is used to atomically modify memory.

Arguments:

There are three arguments to the ‘atomicrmw’ instruction: anoperation to apply, an address whose value to modify, an argument to theoperation. The operation must be one of the following keywords:

  • xchg
  • add
  • sub
  • and
  • nand
  • or
  • xor
  • max
  • min
  • umax
  • umin
  • fadd
  • fsub

For most of these operations, the type of ‘<value>’ must be an integertype whose bit width is a power of two greater than or equal to eightand less than or equal to a target-specific size limit. For xchg, thismay also be a floating point type with the same size constraints asintegers. For fadd/fsub, this must be a floating point type. Thetype of the ‘<pointer>’ operand must be a pointer to that type. Ifthe atomicrmw is marked as volatile, then the optimizer is notallowed to modify the number or order of execution of thisatomicrmw with other volatile operations.

A atomicrmw instruction can also take an optional“syncscope” argument.

Semantics:

The contents of memory at the location specified by the ‘<pointer>’operand are atomically read, modified, and written back. The originalvalue at the location is returned. The modification is specified by theoperation argument:

  • xchg: *ptr = val
  • add: ptr = ptr + val
  • sub: ptr = ptr - val
  • and: ptr = ptr & val
  • nand: ptr = ~(ptr & val)
  • or: ptr = ptr | val
  • xor: ptr = ptr ^ val
  • max: ptr = ptr > val ? *ptr : val (using a signed comparison)
  • min: ptr = ptr < val ? *ptr : val (using a signed comparison)
  • umax: ptr = ptr > val ? *ptr : val (using an unsignedcomparison)
  • umin: ptr = ptr < val ? *ptr : val (using an unsignedcomparison)
  • fadd: ptr = ptr + val (using floating point arithmetic)
  • fsub: ptr = ptr - val (using floating point arithmetic)
Example:
%old = atomicrmw add i32* %ptr, i32 1 acquire                        ; yields i32

‘getelementptr’ Instruction

Syntax:
<result> = getelementptr <ty>, <ty>* <ptrval>{, [inrange] <ty> <idx>}*
<result> = getelementptr inbounds <ty>, <ty>* <ptrval>{, [inrange] <ty> <idx>}*
<result> = getelementptr <ty>, <ptr vector> <ptrval>, [inrange] <vector index type> <idx>
Overview:

The ‘getelementptr’ instruction is used to get the address of asubelement of an aggregate data structure. It performsaddress calculation only and does not access memory. The instruction can alsobe used to calculate a vector of such addresses.

Arguments:

The first argument is always a type used as the basis for the calculations.The second argument is always a pointer or a vector of pointers, and is thebase address to start from. The remaining arguments are indicesthat indicate which of the elements of the aggregate object are indexed.The interpretation of each index is dependent on the type being indexedinto. The first index always indexes the pointer value given as thesecond argument, the second index indexes a value of the type pointed to(not necessarily the value directly pointed to, since the first indexcan be non-zero), etc. The first type indexed into must be a pointervalue, subsequent types can be arrays, vectors, and structs. Note thatsubsequent types being indexed into can never be pointers, since thatwould require loading the pointer before continuing calculation.

The type of each index argument depends on the type it is indexing into.When indexing into a (optionally packed) structure, only i32 integerconstants are allowed (when using a vector of indices they must allbe the same i32 integer constant). When indexing into an array,pointer or vector, integers of any width are allowed, and they are notrequired to be constant. These integers are treated as signed valueswhere relevant.

For example, let’s consider a C code fragment and how it gets compiledto LLVM:

struct RT {
  char A;
  int B[10][20];
  char C;
};
struct ST {
  int X;
  double Y;
  struct RT Z;
};

int *foo(struct ST *s) {
  return &s[1].Z.B[5][13];
}

The LLVM code generated by Clang is:

%struct.RT = type { i8, [10 x [20 x i32]], i8 }
%struct.ST = type { i32, double, %struct.RT }

define i32* @foo(%struct.ST* %s) nounwind uwtable readnone optsize ssp {
entry:
  %arrayidx = getelementptr inbounds %struct.ST, %struct.ST* %s, i64 1, i32 2, i32 1, i64 5, i64 13
  ret i32* %arrayidx
}
Semantics:

In the example above, the first index is indexing into the‘%struct.ST’ type, which is a pointer, yielding a ‘%struct.ST’= ‘{ i32, double, %struct.RT }’ type, a structure. The second indexindexes into the third element of the structure, yielding a‘%struct.RT’ = ‘{ i8 , [10 x [20 x i32]], i8 }’ type, anotherstructure. The third index indexes into the second element of thestructure, yielding a ‘[10 x [20 x i32]]’ type, an array. The twodimensions of the array are subscripted into, yielding an ‘i32’type. The ‘getelementptr’ instruction returns a pointer to thiselement, thus computing a value of ‘i32’ type.

Note that it is perfectly legal to index partially through a structure,returning a pointer to an inner element. Because of this, the LLVM codefor the given testcase is equivalent to:

define i32* @foo(%struct.ST* %s) {
  %t1 = getelementptr %struct.ST, %struct.ST* %s, i32 1                        ; yields %struct.ST*:%t1
  %t2 = getelementptr %struct.ST, %struct.ST* %t1, i32 0, i32 2                ; yields %struct.RT*:%t2
  %t3 = getelementptr %struct.RT, %struct.RT* %t2, i32 0, i32 1                ; yields [10 x [20 x i32]]*:%t3
  %t4 = getelementptr [10 x [20 x i32]], [10 x [20 x i32]]* %t3, i32 0, i32 5  ; yields [20 x i32]*:%t4
  %t5 = getelementptr [20 x i32], [20 x i32]* %t4, i32 0, i32 13               ; yields i32*:%t5
  ret i32* %t5
}

If the inbounds keyword is present, the result value of thegetelementptr is a poison value if the basepointer is not an in bounds address of an allocated object, or if anyof the addresses that would be formed by successive addition of theoffsets implied by the indices to the base address with infinitelyprecise signed arithmetic are not an in bounds address of thatallocated object. The in bounds addresses for an allocated object areall the addresses that point into the object, plus the address one bytepast the end. The only in bounds address for a null pointer in thedefault address-space is the null pointer itself. In cases where thebase is a vector of pointers the inbounds keyword applies to eachof the computations element-wise.

If the inbounds keyword is not present, the offsets are added to thebase address with silently-wrapping two’s complement arithmetic. If theoffsets have a different width from the pointer, they are sign-extendedor truncated to the width of the pointer. The result value of thegetelementptr may be outside the object pointed to by the basepointer. The result value may not necessarily be used to access memorythough, even if it happens to point into allocated storage. See thePointer Aliasing Rules section for moreinformation.

If the inrange keyword is present before any index, loading from orstoring to any pointer derived from the getelementptr has undefinedbehavior if the load or store would access memory outside of the bounds ofthe element selected by the index marked as inrange. The result of apointer comparison or ptrtoint (including ptrtoint-like operationsinvolving memory) involving a pointer derived from a getelementptr withthe inrange keyword is undefined, with the exception of comparisonsin the case where both operands are in the range of the element selectedby the inrange keyword, inclusive of the address one past the end ofthat element. Note that the inrange keyword is currently only allowedin constant getelementptr expressions.

The getelementptr instruction is often confusing. For some more insightinto how it works, see the getelementptr FAQ.

Example:
; yields [12 x i8]*:aptr
%aptr = getelementptr {i32, [12 x i8]}, {i32, [12 x i8]}* %saptr, i64 0, i32 1
; yields i8*:vptr
%vptr = getelementptr {i32, <2 x i8>}, {i32, <2 x i8>}* %svptr, i64 0, i32 1, i32 1
; yields i8*:eptr
%eptr = getelementptr [12 x i8], [12 x i8]* %aptr, i64 0, i32 1
; yields i32*:iptr
%iptr = getelementptr [10 x i32], [10 x i32]* @arr, i16 0, i16 0
Vector of pointers:

The getelementptr returns a vector of pointers, instead of a single address,when one or more of its arguments is a vector. In such cases, all vectorarguments should have the same number of elements, and every scalar argumentwill be effectively broadcast into a vector during address calculation.

; All arguments are vectors:
;   A[i] = ptrs[i] + offsets[i]*sizeof(i8)
%A = getelementptr i8, <4 x i8*> %ptrs, <4 x i64> %offsets

; Add the same scalar offset to each pointer of a vector:
;   A[i] = ptrs[i] + offset*sizeof(i8)
%A = getelementptr i8, <4 x i8*> %ptrs, i64 %offset

; Add distinct offsets to the same pointer:
;   A[i] = ptr + offsets[i]*sizeof(i8)
%A = getelementptr i8, i8* %ptr, <4 x i64> %offsets

; In all cases described above the type of the result is <4 x i8*>

The two following instructions are equivalent:

getelementptr  %struct.ST, <4 x %struct.ST*> %s, <4 x i64> %ind1,
  <4 x i32> <i32 2, i32 2, i32 2, i32 2>,
  <4 x i32> <i32 1, i32 1, i32 1, i32 1>,
  <4 x i32> %ind4,
  <4 x i64> <i64 13, i64 13, i64 13, i64 13>

getelementptr  %struct.ST, <4 x %struct.ST*> %s, <4 x i64> %ind1,
  i32 2, i32 1, <4 x i32> %ind4, i64 13

Let’s look at the C code, where the vector version of getelementptrmakes sense:

// Let's assume that we vectorize the following loop:
double *A, *B; int *C;
for (int i = 0; i < size; ++i) {
  A[i] = B[C[i]];
}
; get pointers for 8 elements from array B
%ptrs = getelementptr double, double* %B, <8 x i32> %C
; load 8 elements from array B into A
%A = call <8 x double> @llvm.masked.gather.v8f64.v8p0f64(<8 x double*> %ptrs,
     i32 8, <8 x i1> %mask, <8 x double> %passthru)

Conversion Operations

The instructions in this category are the conversion instructions(casting) which all take a single operand and a type. They performvarious bit conversions on the operand.

‘trunc .. to’ Instruction

Syntax:
<result> = trunc <ty> <value> to <ty2>             ; yields ty2
Overview:

The ‘trunc’ instruction truncates its operand to the type ty2.

Arguments:

The ‘trunc’ instruction takes a value to trunc, and a type to truncit to. Both types must be of integer types, or vectorsof the same number of integers. The bit size of the value must belarger than the bit size of the destination type, ty2. Equal sizedtypes are not allowed.

Semantics:

The ‘trunc’ instruction truncates the high order bits in valueand converts the remaining bits to ty2. Since the source size mustbe larger than the destination size, trunc cannot be a no-op cast.It will always truncate bits.

Example:
%X = trunc i32 257 to i8                        ; yields i8:1
%Y = trunc i32 123 to i1                        ; yields i1:true
%Z = trunc i32 122 to i1                        ; yields i1:false
%W = trunc <2 x i16> <i16 8, i16 7> to <2 x i8> ; yields <i8 8, i8 7>

‘zext .. to’ Instruction

Syntax:
<result> = zext <ty> <value> to <ty2>             ; yields ty2
Overview:

The ‘zext’ instruction zero extends its operand to type ty2.

Arguments:

The ‘zext’ instruction takes a value to cast, and a type to cast itto. Both types must be of integer types, or vectors ofthe same number of integers. The bit size of the value must besmaller than the bit size of the destination type, ty2.

Semantics:

The zext fills the high order bits of the value with zero bitsuntil it reaches the size of the destination type, ty2.

When zero extending from i1, the result will always be either 0 or 1.

Example:
%X = zext i32 257 to i64              ; yields i64:257
%Y = zext i1 true to i32              ; yields i32:1
%Z = zext <2 x i16> <i16 8, i16 7> to <2 x i32> ; yields <i32 8, i32 7>

‘sext .. to’ Instruction

Syntax:
<result> = sext <ty> <value> to <ty2>             ; yields ty2
Overview:

The ‘sext’ sign extends value to the type ty2.

Arguments:

The ‘sext’ instruction takes a value to cast, and a type to cast itto. Both types must be of integer types, or vectors ofthe same number of integers. The bit size of the value must besmaller than the bit size of the destination type, ty2.

Semantics:

The ‘sext’ instruction performs a sign extension by copying the signbit (highest order bit) of the value until it reaches the bit sizeof the type ty2.

When sign extending from i1, the extension always results in -1 or 0.

Example:
%X = sext i8  -1 to i16              ; yields i16   :65535
%Y = sext i1 true to i32             ; yields i32:-1
%Z = sext <2 x i16> <i16 8, i16 7> to <2 x i32> ; yields <i32 8, i32 7>

‘fptrunc .. to’ Instruction

Syntax:
<result> = fptrunc <ty> <value> to <ty2>             ; yields ty2
Overview:

The ‘fptrunc’ instruction truncates value to type ty2.

Arguments:

The ‘fptrunc’ instruction takes a floating-pointvalue to cast and a floating-point type to cast it to.The size of value must be larger than the size of ty2. Thisimplies that fptrunc cannot be used to make a no-op cast.

Semantics:

The ‘fptrunc’ instruction casts a value from a largerfloating-point type to a smaller floating-point type.This instruction is assumed to execute in the default floating-pointenvironment.

Example:
%X = fptrunc double 16777217.0 to float    ; yields float:16777216.0
%Y = fptrunc double 1.0E+300 to half       ; yields half:+infinity

‘fpext .. to’ Instruction

Syntax:
<result> = fpext <ty> <value> to <ty2>             ; yields ty2
Overview:

The ‘fpext’ extends a floating-point value to a larger floating-pointvalue.

Arguments:

The ‘fpext’ instruction takes a floating-pointvalue to cast, and a floating-point type to cast itto. The source type must be smaller than the destination type.

Semantics:

The ‘fpext’ instruction extends the value from a smallerfloating-point type to a larger floating-point type. The fpext cannot be used to make ano-op cast because it always changes bits. Use bitcast to make ano-op cast for a floating-point cast.

Example:
%X = fpext float 3.125 to double         ; yields double:3.125000e+00
%Y = fpext double %X to fp128            ; yields fp128:0xL00000000000000004000900000000000

‘fptoui .. to’ Instruction

Syntax:
<result> = fptoui <ty> <value> to <ty2>             ; yields ty2
Overview:

The ‘fptoui’ converts a floating-point value to its unsignedinteger equivalent of type ty2.

Arguments:

The ‘fptoui’ instruction takes a value to cast, which must be ascalar or vector floating-point value, and a type tocast it to ty2, which must be an integer type. Ifty is a vector floating-point type, ty2 must be a vector integertype with the same number of elements as ty

Semantics:

The ‘fptoui’ instruction converts its floating-point operand into the nearest (rounding towards zero)unsigned integer value. If the value cannot fit in ty2, the resultis a poison value.

Example:
%X = fptoui double 123.0 to i32      ; yields i32:123
%Y = fptoui float 1.0E+300 to i1     ; yields undefined:1
%Z = fptoui float 1.04E+17 to i8     ; yields undefined:1

‘fptosi .. to’ Instruction

Syntax:
<result> = fptosi <ty> <value> to <ty2>             ; yields ty2
Overview:

The ‘fptosi’ instruction converts floating-pointvalue to type ty2.

Arguments:

The ‘fptosi’ instruction takes a value to cast, which must be ascalar or vector floating-point value, and a type tocast it to ty2, which must be an integer type. Ifty is a vector floating-point type, ty2 must be a vector integertype with the same number of elements as ty

Semantics:

The ‘fptosi’ instruction converts its floating-point operand into the nearest (rounding towards zero)signed integer value. If the value cannot fit in ty2, the resultis a poison value.

Example:
%X = fptosi double -123.0 to i32      ; yields i32:-123
%Y = fptosi float 1.0E-247 to i1      ; yields undefined:1
%Z = fptosi float 1.04E+17 to i8      ; yields undefined:1

‘uitofp .. to’ Instruction

Syntax:
<result> = uitofp <ty> <value> to <ty2>             ; yields ty2
Overview:

The ‘uitofp’ instruction regards value as an unsigned integerand converts that value to the ty2 type.

Arguments:

The ‘uitofp’ instruction takes a value to cast, which must be ascalar or vector integer value, and a type to cast it toty2, which must be an floating-point type. Ifty is a vector integer type, ty2 must be a vector floating-pointtype with the same number of elements as ty

Semantics:

The ‘uitofp’ instruction interprets its operand as an unsignedinteger quantity and converts it to the corresponding floating-pointvalue. If the value cannot be exactly represented, it is rounded usingthe default rounding mode.

Example:
%X = uitofp i32 257 to float         ; yields float:257.0
%Y = uitofp i8 -1 to double          ; yields double:255.0

‘sitofp .. to’ Instruction

Syntax:
<result> = sitofp <ty> <value> to <ty2>             ; yields ty2
Overview:

The ‘sitofp’ instruction regards value as a signed integer andconverts that value to the ty2 type.

Arguments:

The ‘sitofp’ instruction takes a value to cast, which must be ascalar or vector integer value, and a type to cast it toty2, which must be an floating-point type. Ifty is a vector integer type, ty2 must be a vector floating-pointtype with the same number of elements as ty

Semantics:

The ‘sitofp’ instruction interprets its operand as a signed integerquantity and converts it to the corresponding floating-point value. If thevalue cannot be exactly represented, it is rounded using the default roundingmode.

Example:
%X = sitofp i32 257 to float         ; yields float:257.0
%Y = sitofp i8 -1 to double          ; yields double:-1.0

‘ptrtoint .. to’ Instruction

Syntax:
<result> = ptrtoint <ty> <value> to <ty2>             ; yields ty2
Overview:

The ‘ptrtoint’ instruction converts the pointer or a vector ofpointers value to the integer (or vector of integers) type ty2.

Arguments:

The ‘ptrtoint’ instruction takes a value to cast, which must bea value of type pointer or a vector of pointers, and atype to cast it to ty2, which must be an integer ora vector of integers type.

Semantics:

The ‘ptrtoint’ instruction converts value to integer typety2 by interpreting the pointer value as an integer and eithertruncating or zero extending that value to the size of the integer type.If value is smaller than ty2 then a zero extension is done. Ifvalue is larger than ty2 then a truncation is done. If they arethe same size, then nothing is done (no-op cast) other than a typechange.

Example:
%X = ptrtoint i32* %P to i8                         ; yields truncation on 32-bit architecture
%Y = ptrtoint i32* %P to i64                        ; yields zero extension on 32-bit architecture
%Z = ptrtoint <4 x i32*> %P to <4 x i64>; yields vector zero extension for a vector of addresses on 32-bit architecture

‘inttoptr .. to’ Instruction

Syntax:
<result> = inttoptr <ty> <value> to <ty2>[, !dereferenceable !<deref_bytes_node>][, !dereferenceable_or_null !<deref_bytes_node]             ; yields ty2
Overview:

The ‘inttoptr’ instruction converts an integer value to apointer type, ty2.

Arguments:

The ‘inttoptr’ instruction takes an integer value tocast, and a type to cast it to, which must be a pointertype.

The optional !dereferenceable metadata must reference a single metadataname <deref_bytes_node> corresponding to a metadata node with one i64entry.See dereferenceable metadata.

The optional !dereferenceable_or_null metadata must reference a singlemetadata name <deref_bytes_node> corresponding to a metadata node with onei64 entry.See dereferenceable_or_null metadata.

Semantics:

The ‘inttoptr’ instruction converts value to type ty2 byapplying either a zero extension or a truncation depending on the sizeof the integer value. If value is larger than the size of apointer then a truncation is done. If value is smaller than the sizeof a pointer then a zero extension is done. If they are the same size,nothing is done (no-op cast).

Example:
%X = inttoptr i32 255 to i32*          ; yields zero extension on 64-bit architecture
%Y = inttoptr i32 255 to i32*          ; yields no-op on 32-bit architecture
%Z = inttoptr i64 0 to i32*            ; yields truncation on 32-bit architecture
%Z = inttoptr <4 x i32> %G to <4 x i8*>; yields truncation of vector G to four pointers

‘bitcast .. to’ Instruction

Syntax:
<result> = bitcast <ty> <value> to <ty2>             ; yields ty2
Overview:

The ‘bitcast’ instruction converts value to type ty2 withoutchanging any bits.

Arguments:

The ‘bitcast’ instruction takes a value to cast, which must be anon-aggregate first class value, and a type to cast it to, which mustalso be a non-aggregate first class type. Thebit sizes of value and the destination type, ty2, must beidentical. If the source type is a pointer, the destination type mustalso be a pointer of the same size. This instruction supports bitwiseconversion of vectors to integers and to vectors of other types (aslong as they have the same size).

Semantics:

The ‘bitcast’ instruction converts value to type ty2. Itis always a no-op cast because no bits change with thisconversion. The conversion is done as if the value had been storedto memory and read back as type ty2. Pointer (or vector ofpointers) types may only be converted to other pointer (or vector ofpointers) types with the same address space through this instruction.To convert pointers to other types, use the inttoptror ptrtoint instructions first.

Example:
%X = bitcast i8 255 to i8              ; yields i8 :-1
%Y = bitcast i32* %x to sint*          ; yields sint*:%x
%Z = bitcast <2 x int> %V to i64;        ; yields i64: %V
%Z = bitcast <2 x i32*> %V to <2 x i64*> ; yields <2 x i64*>

‘addrspacecast .. to’ Instruction

Syntax:
<result> = addrspacecast <pty> <ptrval> to <pty2>       ; yields pty2
Overview:

The ‘addrspacecast’ instruction converts ptrval from pty inaddress space n to type pty2 in address space m.

Arguments:

The ‘addrspacecast’ instruction takes a pointer or vector of pointer valueto cast and a pointer type to cast it to, which must have a differentaddress space.

Semantics:

The ‘addrspacecast’ instruction converts the pointer valueptrval to type pty2. It can be a no-op cast or a complexvalue modification, depending on the target and the address spacepair. Pointer conversions within the same address space must beperformed with the bitcast instruction. Note that if the address spaceconversion is legal then both result and operand refer to the same memorylocation.

Example:
%X = addrspacecast i32* %x to i32 addrspace(1)*    ; yields i32 addrspace(1)*:%x
%Y = addrspacecast i32 addrspace(1)* %y to i64 addrspace(2)*    ; yields i64 addrspace(2)*:%y
%Z = addrspacecast <4 x i32*> %z to <4 x float addrspace(3)*>   ; yields <4 x float addrspace(3)*>:%z

Other Operations

The instructions in this category are the “miscellaneous” instructions,which defy better classification.

‘icmp’ Instruction

Syntax:
<result> = icmp <cond> <ty> <op1>, <op2>   ; yields i1 or <N x i1>:result
Overview:

The ‘icmp’ instruction returns a boolean value or a vector ofboolean values based on comparison of its two integer, integer vector,pointer, or pointer vector operands.

Arguments:

The ‘icmp’ instruction takes three operands. The first operand isthe condition code indicating the kind of comparison to perform. It isnot a value, just a keyword. The possible condition codes are:

  • eq: equal
  • ne: not equal
  • ugt: unsigned greater than
  • uge: unsigned greater or equal
  • ult: unsigned less than
  • ule: unsigned less or equal
  • sgt: signed greater than
  • sge: signed greater or equal
  • slt: signed less than
  • sle: signed less or equalThe remaining two arguments must be integer orpointer or integer vector typed. Theymust also be identical types.
Semantics:

The ‘icmp’ compares op1 and op2 according to the conditioncode given as cond. The comparison performed always yields either ani1 or vector of i1 result, as follows:

  • eq: yields true if the operands are equal, falseotherwise. No sign interpretation is necessary or performed.
  • ne: yields true if the operands are unequal, falseotherwise. No sign interpretation is necessary or performed.
  • ugt: interprets the operands as unsigned values and yieldstrue if op1 is greater than op2.
  • uge: interprets the operands as unsigned values and yieldstrue if op1 is greater than or equal to op2.
  • ult: interprets the operands as unsigned values and yieldstrue if op1 is less than op2.
  • ule: interprets the operands as unsigned values and yieldstrue if op1 is less than or equal to op2.
  • sgt: interprets the operands as signed values and yields trueif op1 is greater than op2.
  • sge: interprets the operands as signed values and yields trueif op1 is greater than or equal to op2.
  • slt: interprets the operands as signed values and yields trueif op1 is less than op2.
  • sle: interprets the operands as signed values and yields trueif op1 is less than or equal to op2.If the operands are pointer typed, the pointer valuesare compared as if they were integers.

If the operands are integer vectors, then they are compared element byelement. The result is an i1 vector with the same number of elementsas the values being compared. Otherwise, the result is an i1.

Example:
<result> = icmp eq i32 4, 5          ; yields: result=false
<result> = icmp ne float* %X, %X     ; yields: result=false
<result> = icmp ult i16  4, 5        ; yields: result=true
<result> = icmp sgt i16  4, 5        ; yields: result=false
<result> = icmp ule i16 -4, 5        ; yields: result=false
<result> = icmp sge i16  4, 5        ; yields: result=false

‘fcmp’ Instruction

Syntax:
<result> = fcmp [fast-math flags]* <cond> <ty> <op1>, <op2>     ; yields i1 or <N x i1>:result
Overview:

The ‘fcmp’ instruction returns a boolean value or vector of booleanvalues based on comparison of its operands.

If the operands are floating-point scalars, then the result type is aboolean (i1).

If the operands are floating-point vectors, then the result type is avector of boolean with the same number of elements as the operands beingcompared.

Arguments:

The ‘fcmp’ instruction takes three operands. The first operand isthe condition code indicating the kind of comparison to perform. It isnot a value, just a keyword. The possible condition codes are:

  • false: no comparison, always returns false
  • oeq: ordered and equal
  • ogt: ordered and greater than
  • oge: ordered and greater than or equal
  • olt: ordered and less than
  • ole: ordered and less than or equal
  • one: ordered and not equal
  • ord: ordered (no nans)
  • ueq: unordered or equal
  • ugt: unordered or greater than
  • uge: unordered or greater than or equal
  • ult: unordered or less than
  • ule: unordered or less than or equal
  • une: unordered or not equal
  • uno: unordered (either nans)
  • true: no comparison, always returns trueOrdered means that neither operand is a QNAN while unordered meansthat either operand may be a QNAN.

Each of val1 and val2 arguments must be either a floating-point type or a vector of floating-point type.They must have identical types.

Semantics:

The ‘fcmp’ instruction compares op1 and op2 according to thecondition code given as cond. If the operands are vectors, then thevectors are compared element by element. Each comparison performedalways yields an i1 result, as follows:

  • false: always yields false, regardless of operands.
  • oeq: yields true if both operands are not a QNAN and op1is equal to op2.
  • ogt: yields true if both operands are not a QNAN and op1is greater than op2.
  • oge: yields true if both operands are not a QNAN and op1is greater than or equal to op2.
  • olt: yields true if both operands are not a QNAN and op1is less than op2.
  • ole: yields true if both operands are not a QNAN and op1is less than or equal to op2.
  • one: yields true if both operands are not a QNAN and op1is not equal to op2.
  • ord: yields true if both operands are not a QNAN.
  • ueq: yields true if either operand is a QNAN or op1 isequal to op2.
  • ugt: yields true if either operand is a QNAN or op1 isgreater than op2.
  • uge: yields true if either operand is a QNAN or op1 isgreater than or equal to op2.
  • ult: yields true if either operand is a QNAN or op1 isless than op2.
  • ule: yields true if either operand is a QNAN or op1 isless than or equal to op2.
  • une: yields true if either operand is a QNAN or op1 isnot equal to op2.
  • uno: yields true if either operand is a QNAN.
  • true: always yields true, regardless of operands.The fcmp instruction can also optionally take any number offast-math flags, which are optimization hints to enableotherwise unsafe floating-point optimizations.

Any set of fast-math flags are legal on an fcmp instruction, but theonly flags that have any effect on its semantics are those that allowassumptions to be made about the values of input arguments; namelynnan, ninf, and reassoc. See Fast-Math Flags for more information.

Example:
<result> = fcmp oeq float 4.0, 5.0    ; yields: result=false
<result> = fcmp one float 4.0, 5.0    ; yields: result=true
<result> = fcmp olt float 4.0, 5.0    ; yields: result=true
<result> = fcmp ueq double 1.0, 2.0   ; yields: result=false

‘phi’ Instruction

Syntax:
<result> = phi [fast-math-flags] <ty> [ <val0>, <label0>], ...
Overview:

The ‘phi’ instruction is used to implement the φ node in the SSAgraph representing the function.

Arguments:

The type of the incoming values is specified with the first type field.After this, the ‘phi’ instruction takes a list of pairs asarguments, with one pair for each predecessor basic block of the currentblock. Only values of first class type may be used asthe value arguments to the PHI node. Only labels may be used as thelabel arguments.

There must be no non-phi instructions between the start of a basic blockand the PHI instructions: i.e. PHI instructions must be first in a basicblock.

For the purposes of the SSA form, the use of each incoming value isdeemed to occur on the edge from the corresponding predecessor block tothe current block (but after any definition of an ‘invoke’instruction’s return value on the same edge).

The optional fast-math-flags marker indicates that the phi has oneor more fast-math-flags. These are optimization hintsto enable otherwise unsafe floating-point optimizations. Fast-math-flagsare only valid for phis that return a floating-point scalar or vectortype, or an array (nested to any depth) of floating-point scalar or vectortypes.

Semantics:

At runtime, the ‘phi’ instruction logically takes on the valuespecified by the pair corresponding to the predecessor basic block thatexecuted just prior to the current block.

Example:
Loop:       ; Infinite loop that counts from 0 on up...
  %indvar = phi i32 [ 0, %LoopHeader ], [ %nextindvar, %Loop ]
  %nextindvar = add i32 %indvar, 1
  br label %Loop

‘select’ Instruction

Syntax:
<result> = select [fast-math flags] selty <cond>, <ty> <val1>, <ty> <val2>             ; yields ty

selty is either i1 or {<N x i1>}
Overview:

The ‘select’ instruction is used to choose one value based on acondition, without IR-level branching.

Arguments:

The ‘select’ instruction requires an ‘i1’ value or a vector of ‘i1’values indicating the condition, and two values of the same firstclass type.

  • The optional fast-math flags marker indicates that the select has one or morefast-math flags. These are optimization hints to enableotherwise unsafe floating-point optimizations. Fast-math flags are only validfor selects that return a floating-point scalar or vector type, or an array(nested to any depth) of floating-point scalar or vector types.
Semantics:

If the condition is an i1 and it evaluates to 1, the instruction returnsthe first value argument; otherwise, it returns the second valueargument.

If the condition is a vector of i1, then the value arguments must bevectors of the same size, and the selection is done element by element.

If the condition is an i1 and the value arguments are vectors of thesame size, then an entire vector is selected.

Example:
%X = select i1 true, i8 17, i8 42          ; yields i8:17

‘freeze’ Instruction

Syntax:
<result> = freeze ty <val>    ; yields ty:result
Overview:

The ‘freeze’ instruction is used to stop propagation ofundef and poison values.

Arguments:

The ‘freeze’ instruction takes a single argument.

Semantics:

If the argument is undef or poison, ‘freeze’ returns anarbitrary, but fixed, value of type ‘ty’.Otherwise, this instruction is a no-op and returns the input argument.All uses of a value returned by the same ‘freeze’ instruction areguaranteed to always observe the same value, while different ‘freeze’instructions may yield different values.

While undef and poison pointers can be frozen, the result is anon-dereferenceable pointer. See thePointer Aliasing Rules section for more information.

Example:
%w = i32 undef
%x = freeze i32 %w
%y = add i32 %w, %w         ; undef
%z = add i32 %x, %x         ; even number because all uses of %x observe
                            ; the same value
%x2 = freeze i32 %w
%cmp = icmp eq i32 %x, %x2  ; can be true or false

; example with vectors
%v = <2 x i32> <i32 undef, i32 poison>
%a = extractelement <2 x i32> %v, i32 0    ; undef
%b = extractelement <2 x i32> %v, i32 1    ; poison
%add = add i32 %a, %a                      ; undef

%v.fr = freeze <2 x i32> %v                ; element-wise freeze
%d = extractelement <2 x i32> %v.fr, i32 0 ; not undef
%add.f = add i32 %d, %d                    ; even number

; branching on frozen value
%poison = add nsw i1 %k, undef   ; poison
%c = freeze i1 %poison
br i1 %c, label %foo, label %bar ; non-deterministic branch to %foo or %bar

‘call’ Instruction

Syntax:
<result> = [tail | musttail | notail ] call [fast-math flags] [cconv] [ret attrs] [addrspace(<num>)]
           <ty>|<fnty> <fnptrval>(<function args>) [fn attrs] [ operand bundles ]
Overview:

The ‘call’ instruction represents a simple function call.

Arguments:

This instruction requires several arguments:

  • The optional tail and musttail markers indicate that the optimizersshould perform tail call optimization. The tail marker is a hint thatcan be ignored. The musttail markermeans that the call must be tail call optimized in order for the program tobe correct. The musttail marker provides these guarantees:

    • The call will not cause unbounded stack growth if it is part of arecursive cycle in the call graph.
    • Arguments with the inalloca attribute areforwarded in place.
    • If the musttail call appears in a function with the "thunk" attributeand the caller and callee both have varargs, than any unprototypedarguments in register or memory are forwarded to the callee. Similarly,the return value of the callee is returned to the caller’s caller, evenif a void return type is in use.Both markers imply that the callee does not access allocas from the caller.The tail marker additionally implies that the callee does not accessvarargs from the caller. Calls marked musttail must obey the followingadditional rules:

    • The call must immediately precede a ret instruction,or a pointer bitcast followed by a ret instruction.

    • The ret instruction must return the (possibly bitcasted) valueproduced by the call or void.
    • The caller and callee prototypes must match. Pointer types ofparameters or return types may differ in pointee type, but notin address space.
    • The calling conventions of the caller and callee must match.
    • All ABI-impacting function attributes, such as sret, byval, inreg,returned, and inalloca, must match.
    • The callee must be varargs iff the caller is varargs. Bitcasting anon-varargs function to the appropriate varargs type is legal solong as the non-varargs prefixes obey the other rules.Tail call optimization for calls marked tail is guaranteed to occur ifthe following conditions are met:

    • Caller and callee both have the calling convention fastcc or tailcc.

    • The call is in tail position (ret immediately follows call and retuses value of call or is void).
    • Option -tailcallopt is enabled,llvm::GuaranteedTailCallOpt is true, or the calling conventionis tailcc
    • Platform-specific constraints aremet.
  • The optional notail marker indicates that the optimizers should not addtail or musttail markers to the call. It is used to prevent tailcall optimization from being performed on the call.

  • The optional fast-math flags marker indicates that the call has one or morefast-math flags, which are optimization hints to enableotherwise unsafe floating-point optimizations. Fast-math flags are only validfor calls that return a floating-point scalar or vector type, or an array(nested to any depth) of floating-point scalar or vector types.

  • The optional “cconv” marker indicates which callingconvention the call should use. If none isspecified, the call defaults to using C calling conventions. Thecalling convention of the call must match the calling convention ofthe target function, or else the behavior is undefined.

  • The optional Parameter Attributes list for returnvalues. Only ‘zeroext’, ‘signext’, and ‘inreg’ attributesare valid here.

  • The optional addrspace attribute can be used to indicate the address spaceof the called function. If it is not specified, the program address spacefrom the datalayout string will be used.

  • ty’: the type of the call instruction itself which is also thetype of the return value. Functions that return no value are markedvoid.

  • fnty’: shall be the signature of the function being called. Theargument types must match the types implied by this signature. Thistype can be omitted if the function is not varargs.

  • fnptrval’: An LLVM value containing a pointer to a function tobe called. In most cases, this is a direct function call, butindirect call’s are just as possible, calling an arbitrary pointerto function value.

  • function args’: argument list whose types match the functionsignature argument types and parameter attributes. All arguments mustbe of first class type. If the function signatureindicates the function accepts a variable number of arguments, theextra arguments can be specified.

  • The optional function attributes list.

  • The optional operand bundles list.

Semantics:

The ‘call’ instruction is used to cause control flow to transfer toa specified function, with its incoming arguments bound to the specifiedvalues. Upon a ‘ret’ instruction in the called function, controlflow continues with the instruction after the function call, and thereturn value of the function is bound to the result argument.

Example:
%retval = call i32 @test(i32 %argc)
call i32 (i8*, ...)* @printf(i8* %msg, i32 12, i8 42)        ; yields i32
%X = tail call i32 @foo()                                    ; yields i32
%Y = tail call fastcc i32 @foo()  ; yields i32
call void %foo(i8 97 signext)

%struct.A = type { i32, i8 }
%r = call %struct.A @foo()                        ; yields { i32, i8 }
%gr = extractvalue %struct.A %r, 0                ; yields i32
%gr1 = extractvalue %struct.A %r, 1               ; yields i8
%Z = call void @foo() noreturn                    ; indicates that %foo never returns normally
%ZZ = call zeroext i32 @bar()                     ; Return value is %zero extended

llvm treats calls to some functions with names and arguments that matchthe standard C99 library as being the C99 library functions, and mayperform optimizations or generate code for them under that assumption.This is something we’d like to change in the future to provide bettersupport for freestanding environments and non-C-based languages.

‘va_arg’ Instruction

Syntax:
<resultval> = va_arg <va_list*> <arglist>, <argty>
Overview:

The ‘va_arg’ instruction is used to access arguments passed throughthe “variable argument” area of a function call. It is used to implementthe va_arg macro in C.

Arguments:

This instruction takes a va_list* value and the type of theargument. It returns a value of the specified argument type andincrements the va_list to point to the next argument. The actualtype of va_list is target specific.

Semantics:

The ‘va_arg’ instruction loads an argument of the specified typefrom the specified va_list and causes the va_list to point tothe next argument. For more information, see the variable argumenthandling Intrinsic Functions.

It is legal for this instruction to be called in a function which doesnot take a variable number of arguments, for example, the vfprintffunction.

va_arg is an LLVM instruction instead of an intrinsicfunction because it takes a type as an argument.

Example:

See the variable argument processing section.

Note that the code generator does not yet fully support va_arg on manytargets. Also, it does not currently support va_arg with aggregatetypes on any target.

‘landingpad’ Instruction

Syntax:
<resultval> = landingpad <resultty> <clause>+
<resultval> = landingpad <resultty> cleanup <clause>*

<clause> := catch <type> <value>
<clause> := filter <array constant type> <array constant>
Overview:

The ‘landingpad’ instruction is used by LLVM’s exception handlingsystem to specify that a basic blockis a landing pad — one where the exception lands, and corresponds to thecode found in the catch portion of a try/catch sequence. Itdefines values supplied by the personality function uponre-entry to the function. The resultval has the type resultty.

Arguments:

The optionalcleanup flag indicates that the landing pad block is a cleanup.

A clause begins with the clause type — catch or filter — andcontains the global variable representing the “type” that may be caughtor filtered respectively. Unlike the catch clause, the filterclause takes an array constant as its argument. Use“[0 x i8**] undef” for a filter which cannot throw. The‘landingpad’ instruction must contain at least one clause orthe cleanup flag.

Semantics:

The ‘landingpad’ instruction defines the values which are set by thepersonality function upon re-entry to the function, andtherefore the “result type” of the landingpad instruction. As withcalling conventions, how the personality function results arerepresented in LLVM IR is target specific.

The clauses are applied in order from top to bottom. If twolandingpad instructions are merged together through inlining, theclauses from the calling function are appended to the list of clauses.When the call stack is being unwound due to an exception being thrown,the exception is compared against each clause in turn. If it doesn’tmatch any of the clauses, and the cleanup flag is not set, thenunwinding continues further up the call stack.

The landingpad instruction has several restrictions:

  • A landing pad block is a basic block which is the unwind destinationof an ‘invoke’ instruction.
  • A landing pad block must have a ‘landingpad’ instruction as itsfirst non-PHI instruction.
  • There can be only one ‘landingpad’ instruction within the landingpad block.
  • A basic block that is not a landing pad block may not include a‘landingpad’ instruction.
Example:
;; A landing pad which can catch an integer.
%res = landingpad { i8*, i32 }
         catch i8** @_ZTIi
;; A landing pad that is a cleanup.
%res = landingpad { i8*, i32 }
         cleanup
;; A landing pad which can catch an integer and can only throw a double.
%res = landingpad { i8*, i32 }
         catch i8** @_ZTIi
         filter [1 x i8**] [@_ZTId]

‘catchpad’ Instruction

Syntax:
<resultval> = catchpad within <catchswitch> [<args>*]
Overview:

The ‘catchpad’ instruction is used by LLVM’s exception handlingsystem to specify that a basic blockbegins a catch handler — one where a personality routine attempts to transfercontrol to catch an exception.

Arguments:

The catchswitch operand must always be a token produced by acatchswitch instruction in a predecessor block. Thisensures that each catchpad has exactly one predecessor block, and it alwaysterminates in a catchswitch.

The args correspond to whatever information the personality routinerequires to know if this is an appropriate handler for the exception. Controlwill transfer to the catchpad if this is the first appropriate handler forthe exception.

The resultval has the type token and is used to match thecatchpad to corresponding catchrets and other nested EHpads.

Semantics:

When the call stack is being unwound due to an exception being thrown, theexception is compared against the args. If it doesn’t match, control willnot reach the catchpad instruction. The representation of args isentirely target and personality function-specific.

Like the landingpad instruction, the catchpadinstruction must be the first non-phi of its parent basic block.

The meaning of the tokens produced and consumed by catchpad and other “pad”instructions is described in theWindows exception handling documentation.

When a catchpad has been “entered” but not yet “exited” (asdescribed in the EH documentation),it is undefined behavior to execute a call or invokethat does not carry an appropriate “funclet” bundle.

Example:
dispatch:
  %cs = catchswitch within none [label %handler0] unwind to caller
  ;; A catch block which can catch an integer.
handler0:
  %tok = catchpad within %cs [i8** @_ZTIi]

‘cleanuppad’ Instruction

Syntax:
<resultval> = cleanuppad within <parent> [<args>*]
Overview:

The ‘cleanuppad’ instruction is used by LLVM’s exception handlingsystem to specify that a basic blockis a cleanup block — one where a personality routine attempts totransfer control to run cleanup actions.The args correspond to whatever additionalinformation the personality function requires toexecute the cleanup.The resultval has the type token and is used tomatch the cleanuppad to corresponding cleanuprets.The parent argument is the token of the funclet that contains thecleanuppad instruction. If the cleanuppad is not inside a funclet,this operand may be the token none.

Arguments:

The instruction takes a list of arbitrary values which are interpretedby the personality function.

Semantics:

When the call stack is being unwound due to an exception being thrown,the personality function transfers control to thecleanuppad with the aid of the personality-specific arguments.As with calling conventions, how the personality function results arerepresented in LLVM IR is target specific.

The cleanuppad instruction has several restrictions:

  • A cleanup block is a basic block which is the unwind destination ofan exceptional instruction.
  • A cleanup block must have a ‘cleanuppad’ instruction as itsfirst non-PHI instruction.
  • There can be only one ‘cleanuppad’ instruction within thecleanup block.
  • A basic block that is not a cleanup block may not include a‘cleanuppad’ instruction.

When a cleanuppad has been “entered” but not yet “exited” (asdescribed in the EH documentation),it is undefined behavior to execute a call or invokethat does not carry an appropriate “funclet” bundle.

Example:
%tok = cleanuppad within %cs []

Intrinsic Functions

LLVM supports the notion of an “intrinsic function”. These functionshave well known names and semantics and are required to follow certainrestrictions. Overall, these intrinsics represent an extension mechanismfor the LLVM language that does not require changing all of thetransformations in LLVM when adding to the language (or the bitcodereader/writer, the parser, etc…).

Intrinsic function names must all start with an “llvm.” prefix. Thisprefix is reserved in LLVM for intrinsic names; thus, function names maynot begin with this prefix. Intrinsic functions must always be externalfunctions: you cannot define the body of intrinsic functions. Intrinsicfunctions may only be used in call or invoke instructions: it is illegalto take the address of an intrinsic function. Additionally, becauseintrinsic functions are part of the LLVM language, it is required if anyare added that they be documented here.

Some intrinsic functions can be overloaded, i.e., the intrinsicrepresents a family of functions that perform the same operation but ondifferent data types. Because LLVM can represent over 8 milliondifferent integer types, overloading is used commonly to allow anintrinsic function to operate on any integer type. One or more of theargument types or the result type can be overloaded to accept anyinteger type. Argument types may also be defined as exactly matching aprevious argument’s type or the result type. This allows an intrinsicfunction which accepts multiple arguments, but needs all of them to beof the same type, to only be overloaded with respect to a singleargument or the result.

Overloaded intrinsics will have the names of its overloaded argumenttypes encoded into its function name, each preceded by a period. Onlythose types which are overloaded result in a name suffix. Argumentswhose type is matched against another type do not. For example, thellvm.ctpop function can take an integer of any width and returns aninteger of exactly the same integer width. This leads to a family offunctions such as i8 @llvm.ctpop.i8(i8 %val) andi29 @llvm.ctpop.i29(i29 %val). Only one type, the return type, isoverloaded, and only one type suffix is required. Because the argument’stype is matched against the return type, it does not require its ownname suffix.

For target developers who are defining intrinsics for back-end codegeneration, any intrinsic overloads based solely the distinction betweeninteger or floating point types should not be relied upon for correctcode generation. In such cases, the recommended approach for targetmaintainers when defining intrinsics is to create separate integer andFP intrinsics rather than rely on overloading. For example, if differentcodegen is required for llvm.target.foo(<4 x i32>) andllvm.target.foo(<4 x float>) then these should be split intodifferent intrinsics.

To learn how to add an intrinsic function, please see the ExtendingLLVM Guide.

Variable Argument Handling Intrinsics

Variable argument support is defined in LLVM with theva_arg instruction and these three intrinsicfunctions. These functions are related to the similarly named macrosdefined in the <stdarg.h> header file.

All of these functions operate on arguments that use a target-specificvalue type “va_list”. The LLVM assembly language reference manualdoes not define what this type is, so all transformations should beprepared to handle these functions regardless of the type used.

This example shows how the va_arg instruction and thevariable argument handling intrinsic functions are used.

; This struct is different for every platform. For most platforms,
; it is merely an i8*.
%struct.va_list = type { i8* }

; For Unix x86_64 platforms, va_list is the following struct:
; %struct.va_list = type { i32, i32, i8*, i8* }

define i32 @test(i32 %X, ...) {
  ; Initialize variable argument processing
  %ap = alloca %struct.va_list
  %ap2 = bitcast %struct.va_list* %ap to i8*
  call void @llvm.va_start(i8* %ap2)

  ; Read a single integer argument
  %tmp = va_arg i8* %ap2, i32

  ; Demonstrate usage of llvm.va_copy and llvm.va_end
  %aq = alloca i8*
  %aq2 = bitcast i8** %aq to i8*
  call void @llvm.va_copy(i8* %aq2, i8* %ap2)
  call void @llvm.va_end(i8* %aq2)

  ; Stop processing of arguments.
  call void @llvm.va_end(i8* %ap2)
  ret i32 %tmp
}

declare void @llvm.va_start(i8*)
declare void @llvm.va_copy(i8*, i8*)
declare void @llvm.va_end(i8*)

‘llvm.va_start’ Intrinsic

Syntax:
declare void @llvm.va_start(i8* <arglist>)
Overview:

The ‘llvm.va_start’ intrinsic initializes *<arglist> forsubsequent use by va_arg.

Arguments:

The argument is a pointer to a va_list element to initialize.

Semantics:

The ‘llvm.va_start’ intrinsic works just like the va_start macroavailable in C. In a target-dependent way, it initializes theva_list element to which the argument points, so that the next callto va_arg will produce the first variable argument passed to thefunction. Unlike the C va_start macro, this intrinsic does not needto know the last argument of the function as the compiler can figurethat out.

‘llvm.va_end’ Intrinsic

Syntax:
declare void @llvm.va_end(i8* <arglist>)
Overview:

The ‘llvm.va_end’ intrinsic destroys *<arglist>, which has beeninitialized previously with llvm.va_start or llvm.va_copy.

Arguments:

The argument is a pointer to a va_list to destroy.

Semantics:

The ‘llvm.va_end’ intrinsic works just like the va_end macroavailable in C. In a target-dependent way, it destroys the va_listelement to which the argument points. Calls tollvm.va_start andllvm.va_copy must be matched exactly with calls tollvm.va_end.

‘llvm.va_copy’ Intrinsic

Syntax:
declare void @llvm.va_copy(i8* <destarglist>, i8* <srcarglist>)
Overview:

The ‘llvm.va_copy’ intrinsic copies the current argument positionfrom the source argument list to the destination argument list.

Arguments:

The first argument is a pointer to a va_list element to initialize.The second argument is a pointer to a va_list element to copy from.

Semantics:

The ‘llvm.va_copy’ intrinsic works just like the va_copy macroavailable in C. In a target-dependent way, it copies the sourceva_list element into the destination va_list element. Thisintrinsic is necessary because the llvm.va_start intrinsic may bearbitrarily complex and require, for example, memory allocation.

Accurate Garbage Collection Intrinsics

LLVM’s support for Accurate Garbage Collection(GC) requires the frontend to generate code containing appropriate intrinsiccalls and select an appropriate GC strategy which knows how to lower theseintrinsics in a manner which is appropriate for the target collector.

These intrinsics allow identification of GC roots on thestack, as well as garbage collector implementations thatrequire read and write barriers.Frontends for type-safe garbage collected languages should generatethese intrinsics to make use of the LLVM garbage collectors. For moredetails, see Garbage Collection with LLVM.

Experimental Statepoint Intrinsics

LLVM provides an second experimental set of intrinsics for describing garbagecollection safepoints in compiled code. These intrinsics are an alternativeto the llvm.gcroot intrinsics, but are compatible with the ones forread and write barriers. Thedifferences in approach are covered in the Garbage Collection with LLVM documentation. The intrinsics themselves aredescribed in Garbage Collection Safepoints in LLVM.

‘llvm.gcroot’ Intrinsic

Syntax:
declare void @llvm.gcroot(i8** %ptrloc, i8* %metadata)
Overview:

The ‘llvm.gcroot’ intrinsic declares the existence of a GC root tothe code generator, and allows some metadata to be associated with it.

Arguments:

The first argument specifies the address of a stack object that containsthe root pointer. The second pointer (which must be either a constant ora global value address) contains the meta-data to be associated with theroot.

Semantics:

At runtime, a call to this intrinsic stores a null pointer into the“ptrloc” location. At compile-time, the code generator generatesinformation to allow the runtime to find the pointer at GC safe points.The ‘llvm.gcroot’ intrinsic may only be used in a function whichspecifies a GC algorithm.

‘llvm.gcread’ Intrinsic

Syntax:
declare i8* @llvm.gcread(i8* %ObjPtr, i8** %Ptr)
Overview:

The ‘llvm.gcread’ intrinsic identifies reads of references from heaplocations, allowing garbage collector implementations that require readbarriers.

Arguments:

The second argument is the address to read from, which should be anaddress allocated from the garbage collector. The first object is apointer to the start of the referenced object, if needed by the languageruntime (otherwise null).

Semantics:

The ‘llvm.gcread’ intrinsic has the same semantics as a loadinstruction, but may be replaced with substantially more complex code bythe garbage collector runtime, as needed. The ‘llvm.gcread’intrinsic may only be used in a function which specifies a GCalgorithm.

‘llvm.gcwrite’ Intrinsic

Syntax:
declare void @llvm.gcwrite(i8* %P1, i8* %Obj, i8** %P2)
Overview:

The ‘llvm.gcwrite’ intrinsic identifies writes of references to heaplocations, allowing garbage collector implementations that require writebarriers (such as generational or reference counting collectors).

Arguments:

The first argument is the reference to store, the second is the start ofthe object to store it to, and the third is the address of the field ofObj to store to. If the runtime does not require a pointer to theobject, Obj may be null.

Semantics:

The ‘llvm.gcwrite’ intrinsic has the same semantics as a storeinstruction, but may be replaced with substantially more complex code bythe garbage collector runtime, as needed. The ‘llvm.gcwrite’intrinsic may only be used in a function which specifies a GCalgorithm.

Code Generator Intrinsics

These intrinsics are provided by LLVM to expose special features thatmay only be implemented with code generator support.

‘llvm.returnaddress’ Intrinsic

Syntax:
declare i8* @llvm.returnaddress(i32 <level>)
Overview:

The ‘llvm.returnaddress’ intrinsic attempts to compute atarget-specific value indicating the return address of the currentfunction or one of its callers.

Arguments:

The argument to this intrinsic indicates which function to return theaddress for. Zero indicates the calling function, one indicates itscaller, etc. The argument is required to be a constant integervalue.

Semantics:

The ‘llvm.returnaddress’ intrinsic either returns a pointerindicating the return address of the specified call frame, or zero if itcannot be identified. The value returned by this intrinsic is likely tobe incorrect or 0 for arguments other than zero, so it should only beused for debugging purposes.

Note that calling this intrinsic does not prevent function inlining orother aggressive transformations, so the value returned may not be thatof the obvious source-language caller.

‘llvm.addressofreturnaddress’ Intrinsic

Syntax:
declare i8* @llvm.addressofreturnaddress()
Overview:

The ‘llvm.addressofreturnaddress’ intrinsic returns a target-specificpointer to the place in the stack frame where the return address of thecurrent function is stored.

Semantics:

Note that calling this intrinsic does not prevent function inlining orother aggressive transformations, so the value returned may not be thatof the obvious source-language caller.

This intrinsic is only implemented for x86 and aarch64.

‘llvm.sponentry’ Intrinsic

Syntax:
declare i8* @llvm.sponentry()
Overview:

The ‘llvm.sponentry’ intrinsic returns the stack pointer value atthe entry of the current function calling this intrinsic.

Semantics:

Note this intrinsic is only verified on AArch64.

‘llvm.frameaddress’ Intrinsic

Syntax:
declare i8* @llvm.frameaddress(i32 <level>)
Overview:

The ‘llvm.frameaddress’ intrinsic attempts to return thetarget-specific frame pointer value for the specified stack frame.

Arguments:

The argument to this intrinsic indicates which function to return theframe pointer for. Zero indicates the calling function, one indicatesits caller, etc. The argument is required to be a constant integervalue.

Semantics:

The ‘llvm.frameaddress’ intrinsic either returns a pointerindicating the frame address of the specified call frame, or zero if itcannot be identified. The value returned by this intrinsic is likely tobe incorrect or 0 for arguments other than zero, so it should only beused for debugging purposes.

Note that calling this intrinsic does not prevent function inlining orother aggressive transformations, so the value returned may not be thatof the obvious source-language caller.

‘llvm.localescape’ and ‘llvm.localrecover’ Intrinsics

Syntax:
declare void @llvm.localescape(...)
declare i8* @llvm.localrecover(i8* %func, i8* %fp, i32 %idx)
Overview:

The ‘llvm.localescape’ intrinsic escapes offsets of a collection of staticallocas, and the ‘llvm.localrecover’ intrinsic applies those offsets to alive frame pointer to recover the address of the allocation. The offset iscomputed during frame layout of the caller of llvm.localescape.

Arguments:

All arguments to ‘llvm.localescape’ must be pointers to static allocas orcasts of static allocas. Each function can only call ‘llvm.localescape’once, and it can only do so from the entry block.

The func argument to ‘llvm.localrecover’ must be a constantbitcasted pointer to a function defined in the current module. The codegenerator cannot determine the frame allocation offset of functions defined inother modules.

The fp argument to ‘llvm.localrecover’ must be a frame pointer of acall frame that is currently live. The return value of ‘llvm.localaddress’is one way to produce such a value, but various runtimes also expose a suitablepointer in platform-specific ways.

The idx argument to ‘llvm.localrecover’ indicates which alloca passed to‘llvm.localescape’ to recover. It is zero-indexed.

Semantics:

These intrinsics allow a group of functions to share access to a set of localstack allocations of a one parent function. The parent function may call the‘llvm.localescape’ intrinsic once from the function entry block, and thechild functions can use ‘llvm.localrecover’ to access the escaped allocas.The ‘llvm.localescape’ intrinsic blocks inlining, as inlining changes wherethe escaped allocas are allocated, which would break attempts to use‘llvm.localrecover’.

‘llvm.read_register’ and ‘llvm.write_register’ Intrinsics

Syntax:
declare i32 @llvm.read_register.i32(metadata)
declare i64 @llvm.read_register.i64(metadata)
declare void @llvm.write_register.i32(metadata, i32 @value)
declare void @llvm.write_register.i64(metadata, i64 @value)
!0 = !{!"sp\00"}
Overview:

The ‘llvm.read_register’ and ‘llvm.write_register’ intrinsicsprovides access to the named register. The register must be valid onthe architecture being compiled to. The type needs to be compatiblewith the register being read.

Semantics:

The ‘llvm.read_register’ intrinsic returns the current value of theregister, where possible. The ‘llvm.write_register’ intrinsic setsthe current value of the register, where possible.

This is useful to implement named register global variables that needto always be mapped to a specific register, as is common practice onbare-metal programs including OS kernels.

The compiler doesn’t check for register availability or use of the usedregister in surrounding code, including inline assembly. Because of that,allocatable registers are not supported.

Warning: So far it only works with the stack pointer on selectedarchitectures (ARM, AArch64, PowerPC and x86_64). Significant amount ofwork is needed to support other registers and even more so, allocatableregisters.

‘llvm.stacksave’ Intrinsic

Syntax:
declare i8* @llvm.stacksave()
Overview:

The ‘llvm.stacksave’ intrinsic is used to remember the current stateof the function stack, for use withllvm.stackrestore. This is useful forimplementing language features like scoped automatic variable sizedarrays in C99.

Semantics:

This intrinsic returns a opaque pointer value that can be passed tollvm.stackrestore. When anllvm.stackrestore intrinsic is executed with a value saved fromllvm.stacksave, it effectively restores the state of the stack tothe state it was in when the llvm.stacksave intrinsic executed. Inpractice, this pops any alloca blocks from the stack thatwere allocated after the llvm.stacksave was executed.

‘llvm.stackrestore’ Intrinsic

Syntax:
declare void @llvm.stackrestore(i8* %ptr)
Overview:

The ‘llvm.stackrestore’ intrinsic is used to restore the state ofthe function stack to the state it was in when the correspondingllvm.stacksave intrinsic executed. This isuseful for implementing language features like scoped automatic variablesized arrays in C99.

Semantics:

See the description for llvm.stacksave.

‘llvm.get.dynamic.area.offset’ Intrinsic

Syntax:
declare i32 @llvm.get.dynamic.area.offset.i32()
declare i64 @llvm.get.dynamic.area.offset.i64()
Overview:
The ‘llvm.get.dynamic.area.offset.*’ intrinsic family is used toget the offset from native stack pointer to the address of the mostrecent dynamic alloca on the caller’s stack. These intrinsics areintendend for use in combination withllvm.stacksave to get apointer to the most recent dynamic alloca. This is useful, for example,for AddressSanitizer’s stack unpoisoning routines.
Semantics:

These intrinsics return a non-negative integer value that can be used toget the address of the most recent dynamic alloca, allocated by allocaon the caller’s stack. In particular, for targets where stack grows downwards,adding this offset to the native stack pointer would get the address of the mostrecent dynamic alloca. For targets where stack grows upwards, the situation is a bit morecomplicated, because subtracting this value from stack pointer would get the addressone past the end of the most recent dynamic alloca.

Although for most targets llvm.get.dynamic.area.offset <int_get_dynamic_area_offset>returns just a zero, for others, such as PowerPC and PowerPC64, it returns acompile-time-known constant value.

The return value type of llvm.get.dynamic.area.offsetmust match the target’s default address space’s (address space 0) pointer type.

‘llvm.prefetch’ Intrinsic

Syntax:
declare void @llvm.prefetch(i8* <address>, i32 <rw>, i32 <locality>, i32 <cache type>)
Overview:

The ‘llvm.prefetch’ intrinsic is a hint to the code generator toinsert a prefetch instruction if supported; otherwise, it is a noop.Prefetches have no effect on the behavior of the program but can changeits performance characteristics.

Arguments:

address is the address to be prefetched, rw is the specifierdetermining if the fetch should be for a read (0) or write (1), andlocality is a temporal locality specifier ranging from (0) - nolocality, to (3) - extremely local keep in cache. The cache typespecifies whether the prefetch is performed on the data (1) orinstruction (0) cache. The rw, locality and cache typearguments must be constant integers.

Semantics:

This intrinsic does not modify the behavior of the program. Inparticular, prefetches cannot trap and do not produce a value. Ontargets that support this intrinsic, the prefetch can provide hints tothe processor cache for better performance.

‘llvm.pcmarker’ Intrinsic

Syntax:
declare void @llvm.pcmarker(i32 <id>)
Overview:

The ‘llvm.pcmarker’ intrinsic is a method to export a ProgramCounter (PC) in a region of code to simulators and other tools. Themethod is target specific, but it is expected that the marker will useexported symbols to transmit the PC of the marker. The marker makes noguarantees that it will remain with any specific instruction afteroptimizations. It is possible that the presence of a marker will inhibitoptimizations. The intended use is to be inserted after optimizations toallow correlations of simulation runs.

Arguments:

id is a numerical id identifying the marker.

Semantics:

This intrinsic does not modify the behavior of the program. Backendsthat do not support this intrinsic may ignore it.

‘llvm.readcyclecounter’ Intrinsic

Syntax:
declare i64 @llvm.readcyclecounter()
Overview:

The ‘llvm.readcyclecounter’ intrinsic provides access to the cyclecounter register (or similar low latency, high accuracy clocks) on thosetargets that support it. On X86, it should map to RDTSC. On Alpha, itshould map to RPCC. As the backing counters overflow quickly (on theorder of 9 seconds on alpha), this should only be used for smalltimings.

Semantics:

When directly supported, reading the cycle counter should not modify anymemory. Implementations are allowed to either return a applicationspecific value or a system wide value. On backends without support, thisis lowered to a constant 0.

Note that runtime support may be conditional on the privilege-level code isrunning at and the host platform.

‘llvm.clear_cache’ Intrinsic

Syntax:
declare void @llvm.clear_cache(i8*, i8*)
Overview:

The ‘llvm.clear_cache’ intrinsic ensures visibility of modificationsin the specified range to the execution unit of the processor. Ontargets with non-unified instruction and data cache, the implementationflushes the instruction cache.

Semantics:

On platforms with coherent instruction and data caches (e.g. x86), thisintrinsic is a nop. On platforms with non-coherent instruction and datacache (e.g. ARM, MIPS), the intrinsic is lowered either to appropriateinstructions or a system call, if cache flushing requires specialprivileges.

The default behavior is to emit a call to __clear_cache from the runtime library.

This intrinsic does not empty the instruction pipeline. Modificationsof the current function are outside the scope of the intrinsic.

‘llvm.instrprof.increment’ Intrinsic

Syntax:
declare void @llvm.instrprof.increment(i8* <name>, i64 <hash>,
                                       i32 <num-counters>, i32 <index>)
Overview:

The ‘llvm.instrprof.increment’ intrinsic can be emitted by afrontend for use with instrumentation based profiling. These will belowered by the -instrprof pass to generate execution counts of aprogram at runtime.

Arguments:

The first argument is a pointer to a global variable containing thename of the entity being instrumented. This should generally be the(mangled) function name for a set of counters.

The second argument is a hash value that can be used by the consumerof the profile data to detect changes to the instrumented source, andthe third is the number of counters associated with name. It is anerror if hash or num-counters differ between two instances ofinstrprof.increment that refer to the same name.

The last argument refers to which of the counters for name shouldbe incremented. It should be a value between 0 and num-counters.

Semantics:

This intrinsic represents an increment of a profiling counter. It willcause the -instrprof pass to generate the appropriate datastructures and the code to increment the appropriate value, in aformat that can be written out by a compiler runtime and consumed viathe llvm-profdata tool.

‘llvm.instrprof.increment.step’ Intrinsic

Syntax:
declare void @llvm.instrprof.increment.step(i8* <name>, i64 <hash>,
                                            i32 <num-counters>,
                                            i32 <index>, i64 <step>)
Overview:

The ‘llvm.instrprof.increment.step’ intrinsic is an extension tothe ‘llvm.instrprof.increment’ intrinsic with an additional fifthargument to specify the step of the increment.

Arguments:

The first four arguments are the same as ‘llvm.instrprof.increment’intrinsic.

The last argument specifies the value of the increment of the counter variable.

Semantics:

See description of ‘llvm.instrprof.increment’ intrinsic.

‘llvm.instrprof.value.profile’ Intrinsic

Syntax:
declare void @llvm.instrprof.value.profile(i8* <name>, i64 <hash>,
                                           i64 <value>, i32 <value_kind>,
                                           i32 <index>)
Overview:

The ‘llvm.instrprof.value.profile’ intrinsic can be emitted by afrontend for use with instrumentation based profiling. This will belowered by the -instrprof pass to find out the target values,instrumented expressions take in a program at runtime.

Arguments:

The first argument is a pointer to a global variable containing thename of the entity being instrumented. name should generally be the(mangled) function name for a set of counters.

The second argument is a hash value that can be used by the consumerof the profile data to detect changes to the instrumented source. Itis an error if hash differs between two instances ofllvm.instrprof.* that refer to the same name.

The third argument is the value of the expression being profiled. The profiledexpression’s value should be representable as an unsigned 64-bit value. Thefourth argument represents the kind of value profiling that is being done. Thesupported value profiling kinds are enumerated through theInstrProfValueKind type declared in the<include/llvm/ProfileData/InstrProf.h> header file. The last argument is theindex of the instrumented expression within name. It should be >= 0.

Semantics:

This intrinsic represents the point where a call to a runtime routineshould be inserted for value profiling of target expressions. -instrprofpass will generate the appropriate data structures and replace thellvm.instrprof.value.profile intrinsic with the call to the profileruntime library with proper arguments.

‘llvm.thread.pointer’ Intrinsic

Syntax:
declare i8* @llvm.thread.pointer()
Overview:

The ‘llvm.thread.pointer’ intrinsic returns the value of the threadpointer.

Semantics:

The ‘llvm.thread.pointer’ intrinsic returns a pointer to the TLS areafor the current thread. The exact semantics of this value are targetspecific: it may point to the start of TLS area, to the end, or somewherein the middle. Depending on the target, this intrinsic may read a register,call a helper function, read from an alternate memory space, or performother operations necessary to locate the TLS area. Not all targets supportthis intrinsic.

Standard C Library Intrinsics

LLVM provides intrinsics for a few important standard C libraryfunctions. These intrinsics allow source-language front-ends to passinformation about the alignment of the pointer arguments to the codegenerator, providing opportunity for more efficient code generation.

‘llvm.memcpy’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.memcpy on anyinteger bit width and for different address spaces. Not all targetssupport all bit widths however.

declare void @llvm.memcpy.p0i8.p0i8.i32(i8* <dest>, i8* <src>,
                                        i32 <len>, i1 <isvolatile>)
declare void @llvm.memcpy.p0i8.p0i8.i64(i8* <dest>, i8* <src>,
                                        i64 <len>, i1 <isvolatile>)
Overview:

The ‘llvm.memcpy.*’ intrinsics copy a block of memory from thesource location to the destination location.

Note that, unlike the standard libc function, the llvm.memcpy.*intrinsics do not return a value, takes extra isvolatilearguments and the pointers can be in specified address spaces.

Arguments:

The first argument is a pointer to the destination, the second is apointer to the source. The third argument is an integer argumentspecifying the number of bytes to copy, and the fourth is aboolean indicating a volatile access.

The align parameter attribute can be providedfor the first and second arguments.

If the isvolatile parameter is true, the llvm.memcpy call isa volatile operation. The detailed access behavior is notvery cleanly specified and it is unwise to depend on it.

Semantics:

The ‘llvm.memcpy.*’ intrinsics copy a block of memory from thesource location to the destination location, which are not allowed tooverlap. It copies “len” bytes of memory over. If the argument is knownto be aligned to some boundary, this can be specified as an attribute onthe argument.

If “len” is 0, the pointers may be NULL or dangling. However, they must stillbe appropriately aligned.

‘llvm.memcpy.inline’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.memcpy.inline on anyinteger bit width and for different address spaces. Not all targetssupport all bit widths however.

declare void @llvm.memcpy.inline.p0i8.p0i8.i32(i8* <dest>, i8* <src>,
                                               i32 <len>, i1 <isvolatile>)
declare void @llvm.memcpy.inline.p0i8.p0i8.i64(i8* <dest>, i8* <src>,
                                               i64 <len>, i1 <isvolatile>)
Overview:

The ‘llvm.memcpy.inline.*’ intrinsics copy a block of memory from thesource location to the destination location and guarantees that no externalfunctions are called.

Note that, unlike the standard libc function, the llvm.memcpy.inline.*intrinsics do not return a value, takes extra isvolatilearguments and the pointers can be in specified address spaces.

Arguments:

The first argument is a pointer to the destination, the second is apointer to the source. The third argument is a constant integer argumentspecifying the number of bytes to copy, and the fourth is aboolean indicating a volatile access.

The align parameter attribute can be providedfor the first and second arguments.

If the isvolatile parameter is true, the llvm.memcpy.inline call isa volatile operation. The detailed access behavior is notvery cleanly specified and it is unwise to depend on it.

Semantics:

The ‘llvm.memcpy.inline.*’ intrinsics copy a block of memory from thesource location to the destination location, which are not allowed tooverlap. It copies “len” bytes of memory over. If the argument is knownto be aligned to some boundary, this can be specified as an attribute onthe argument.

If “len” is 0, the pointers may be NULL or dangling. However, they must stillbe appropriately aligned.

The generated code is guaranteed not to call any external functions.

‘llvm.memmove’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.memmove on any integerbit width and for different address space. Not all targets support allbit widths however.

declare void @llvm.memmove.p0i8.p0i8.i32(i8* <dest>, i8* <src>,
                                         i32 <len>, i1 <isvolatile>)
declare void @llvm.memmove.p0i8.p0i8.i64(i8* <dest>, i8* <src>,
                                         i64 <len>, i1 <isvolatile>)
Overview:

The ‘llvm.memmove.*’ intrinsics move a block of memory from thesource location to the destination location. It is similar to the‘llvm.memcpy’ intrinsic but allows the two memory locations tooverlap.

Note that, unlike the standard libc function, the llvm.memmove.*intrinsics do not return a value, takes an extra isvolatileargument and the pointers can be in specified address spaces.

Arguments:

The first argument is a pointer to the destination, the second is apointer to the source. The third argument is an integer argumentspecifying the number of bytes to copy, and the fourth is aboolean indicating a volatile access.

The align parameter attribute can be providedfor the first and second arguments.

If the isvolatile parameter is true, the llvm.memmove callis a volatile operation. The detailed access behavior isnot very cleanly specified and it is unwise to depend on it.

Semantics:

The ‘llvm.memmove.*’ intrinsics copy a block of memory from thesource location to the destination location, which may overlap. Itcopies “len” bytes of memory over. If the argument is known to bealigned to some boundary, this can be specified as an attribute onthe argument.

If “len” is 0, the pointers may be NULL or dangling. However, they must stillbe appropriately aligned.

‘llvm.memset.*’ Intrinsics

Syntax:

This is an overloaded intrinsic. You can use llvm.memset on any integerbit width and for different address spaces. However, not all targetssupport all bit widths.

declare void @llvm.memset.p0i8.i32(i8* <dest>, i8 <val>,
                                   i32 <len>, i1 <isvolatile>)
declare void @llvm.memset.p0i8.i64(i8* <dest>, i8 <val>,
                                   i64 <len>, i1 <isvolatile>)
Overview:

The ‘llvm.memset.*’ intrinsics fill a block of memory with aparticular byte value.

Note that, unlike the standard libc function, the llvm.memsetintrinsic does not return a value and takes an extra volatileargument. Also, the destination can be in an arbitrary address space.

Arguments:

The first argument is a pointer to the destination to fill, the secondis the byte value with which to fill it, the third argument is aninteger argument specifying the number of bytes to fill, and the fourthis a boolean indicating a volatile access.

The align parameter attribute can be providedfor the first arguments.

If the isvolatile parameter is true, the llvm.memset call isa volatile operation. The detailed access behavior is notvery cleanly specified and it is unwise to depend on it.

Semantics:

The ‘llvm.memset.*’ intrinsics fill “len” bytes of memory startingat the destination location. If the argument is known to bealigned to some boundary, this can be specified as an attribute onthe argument.

If “len” is 0, the pointers may be NULL or dangling. However, they must stillbe appropriately aligned.

‘llvm.sqrt.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.sqrt on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.sqrt.f32(float %Val)
declare double    @llvm.sqrt.f64(double %Val)
declare x86_fp80  @llvm.sqrt.f80(x86_fp80 %Val)
declare fp128     @llvm.sqrt.f128(fp128 %Val)
declare ppc_fp128 @llvm.sqrt.ppcf128(ppc_fp128 %Val)
Overview:

The ‘llvm.sqrt’ intrinsics return the square root of the specified value.

Arguments:

The argument and return value are floating-point numbers of the same type.

Semantics:

Return the same value as a corresponding libm ‘sqrt’ function but withouttrapping or setting errno. For types specified by IEEE-754, the resultmatches a conforming libm implementation.

When specified with the fast-math-flag ‘afn’, the result may be approximatedusing a less accurate calculation.

‘llvm.powi.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.powi on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.powi.f32(float  %Val, i32 %power)
declare double    @llvm.powi.f64(double %Val, i32 %power)
declare x86_fp80  @llvm.powi.f80(x86_fp80  %Val, i32 %power)
declare fp128     @llvm.powi.f128(fp128 %Val, i32 %power)
declare ppc_fp128 @llvm.powi.ppcf128(ppc_fp128  %Val, i32 %power)
Overview:

The ‘llvm.powi.*’ intrinsics return the first operand raised to thespecified (positive or negative) power. The order of evaluation ofmultiplications is not defined. When a vector of floating-point type isused, the second argument remains a scalar integer value.

Arguments:

The second argument is an integer power, and the first is a value toraise to that power.

Semantics:

This function returns the first value raised to the second power with anunspecified sequence of rounding operations.

‘llvm.sin.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.sin on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.sin.f32(float  %Val)
declare double    @llvm.sin.f64(double %Val)
declare x86_fp80  @llvm.sin.f80(x86_fp80  %Val)
declare fp128     @llvm.sin.f128(fp128 %Val)
declare ppc_fp128 @llvm.sin.ppcf128(ppc_fp128  %Val)
Overview:

The ‘llvm.sin.*’ intrinsics return the sine of the operand.

Arguments:

The argument and return value are floating-point numbers of the same type.

Semantics:

Return the same value as a corresponding libm ‘sin’ function but withouttrapping or setting errno.

When specified with the fast-math-flag ‘afn’, the result may be approximatedusing a less accurate calculation.

‘llvm.cos.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.cos on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.cos.f32(float  %Val)
declare double    @llvm.cos.f64(double %Val)
declare x86_fp80  @llvm.cos.f80(x86_fp80  %Val)
declare fp128     @llvm.cos.f128(fp128 %Val)
declare ppc_fp128 @llvm.cos.ppcf128(ppc_fp128  %Val)
Overview:

The ‘llvm.cos.*’ intrinsics return the cosine of the operand.

Arguments:

The argument and return value are floating-point numbers of the same type.

Semantics:

Return the same value as a corresponding libm ‘cos’ function but withouttrapping or setting errno.

When specified with the fast-math-flag ‘afn’, the result may be approximatedusing a less accurate calculation.

‘llvm.pow.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.pow on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.pow.f32(float  %Val, float %Power)
declare double    @llvm.pow.f64(double %Val, double %Power)
declare x86_fp80  @llvm.pow.f80(x86_fp80  %Val, x86_fp80 %Power)
declare fp128     @llvm.pow.f128(fp128 %Val, fp128 %Power)
declare ppc_fp128 @llvm.pow.ppcf128(ppc_fp128  %Val, ppc_fp128 Power)
Overview:

The ‘llvm.pow.*’ intrinsics return the first operand raised to thespecified (positive or negative) power.

Arguments:

The arguments and return value are floating-point numbers of the same type.

Semantics:

Return the same value as a corresponding libm ‘pow’ function but withouttrapping or setting errno.

When specified with the fast-math-flag ‘afn’, the result may be approximatedusing a less accurate calculation.

‘llvm.exp.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.exp on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.exp.f32(float  %Val)
declare double    @llvm.exp.f64(double %Val)
declare x86_fp80  @llvm.exp.f80(x86_fp80  %Val)
declare fp128     @llvm.exp.f128(fp128 %Val)
declare ppc_fp128 @llvm.exp.ppcf128(ppc_fp128  %Val)
Overview:

The ‘llvm.exp.*’ intrinsics compute the base-e exponential of the specifiedvalue.

Arguments:

The argument and return value are floating-point numbers of the same type.

Semantics:

Return the same value as a corresponding libm ‘exp’ function but withouttrapping or setting errno.

When specified with the fast-math-flag ‘afn’, the result may be approximatedusing a less accurate calculation.

‘llvm.exp2.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.exp2 on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.exp2.f32(float  %Val)
declare double    @llvm.exp2.f64(double %Val)
declare x86_fp80  @llvm.exp2.f80(x86_fp80  %Val)
declare fp128     @llvm.exp2.f128(fp128 %Val)
declare ppc_fp128 @llvm.exp2.ppcf128(ppc_fp128  %Val)
Overview:

The ‘llvm.exp2.*’ intrinsics compute the base-2 exponential of thespecified value.

Arguments:

The argument and return value are floating-point numbers of the same type.

Semantics:

Return the same value as a corresponding libm ‘exp2’ function but withouttrapping or setting errno.

When specified with the fast-math-flag ‘afn’, the result may be approximatedusing a less accurate calculation.

‘llvm.log.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.log on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.log.f32(float  %Val)
declare double    @llvm.log.f64(double %Val)
declare x86_fp80  @llvm.log.f80(x86_fp80  %Val)
declare fp128     @llvm.log.f128(fp128 %Val)
declare ppc_fp128 @llvm.log.ppcf128(ppc_fp128  %Val)
Overview:

The ‘llvm.log.*’ intrinsics compute the base-e logarithm of the specifiedvalue.

Arguments:

The argument and return value are floating-point numbers of the same type.

Semantics:

Return the same value as a corresponding libm ‘log’ function but withouttrapping or setting errno.

When specified with the fast-math-flag ‘afn’, the result may be approximatedusing a less accurate calculation.

‘llvm.log10.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.log10 on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.log10.f32(float  %Val)
declare double    @llvm.log10.f64(double %Val)
declare x86_fp80  @llvm.log10.f80(x86_fp80  %Val)
declare fp128     @llvm.log10.f128(fp128 %Val)
declare ppc_fp128 @llvm.log10.ppcf128(ppc_fp128  %Val)
Overview:

The ‘llvm.log10.*’ intrinsics compute the base-10 logarithm of thespecified value.

Arguments:

The argument and return value are floating-point numbers of the same type.

Semantics:

Return the same value as a corresponding libm ‘log10’ function but withouttrapping or setting errno.

When specified with the fast-math-flag ‘afn’, the result may be approximatedusing a less accurate calculation.

‘llvm.log2.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.log2 on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.log2.f32(float  %Val)
declare double    @llvm.log2.f64(double %Val)
declare x86_fp80  @llvm.log2.f80(x86_fp80  %Val)
declare fp128     @llvm.log2.f128(fp128 %Val)
declare ppc_fp128 @llvm.log2.ppcf128(ppc_fp128  %Val)
Overview:

The ‘llvm.log2.*’ intrinsics compute the base-2 logarithm of the specifiedvalue.

Arguments:

The argument and return value are floating-point numbers of the same type.

Semantics:

Return the same value as a corresponding libm ‘log2’ function but withouttrapping or setting errno.

When specified with the fast-math-flag ‘afn’, the result may be approximatedusing a less accurate calculation.

‘llvm.fma.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.fma on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.fma.f32(float  %a, float  %b, float  %c)
declare double    @llvm.fma.f64(double %a, double %b, double %c)
declare x86_fp80  @llvm.fma.f80(x86_fp80 %a, x86_fp80 %b, x86_fp80 %c)
declare fp128     @llvm.fma.f128(fp128 %a, fp128 %b, fp128 %c)
declare ppc_fp128 @llvm.fma.ppcf128(ppc_fp128 %a, ppc_fp128 %b, ppc_fp128 %c)
Overview:

The ‘llvm.fma.*’ intrinsics perform the fused multiply-add operation.

Arguments:

The arguments and return value are floating-point numbers of the same type.

Semantics:

Return the same value as a corresponding libm ‘fma’ function but withouttrapping or setting errno.

When specified with the fast-math-flag ‘afn’, the result may be approximatedusing a less accurate calculation.

‘llvm.fabs.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.fabs on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.fabs.f32(float  %Val)
declare double    @llvm.fabs.f64(double %Val)
declare x86_fp80  @llvm.fabs.f80(x86_fp80 %Val)
declare fp128     @llvm.fabs.f128(fp128 %Val)
declare ppc_fp128 @llvm.fabs.ppcf128(ppc_fp128 %Val)
Overview:

The ‘llvm.fabs.*’ intrinsics return the absolute value of theoperand.

Arguments:

The argument and return value are floating-point numbers of the sametype.

Semantics:

This function returns the same values as the libm fabs functionswould, and handles error conditions in the same way.

‘llvm.minnum.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.minnum on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.minnum.f32(float %Val0, float %Val1)
declare double    @llvm.minnum.f64(double %Val0, double %Val1)
declare x86_fp80  @llvm.minnum.f80(x86_fp80 %Val0, x86_fp80 %Val1)
declare fp128     @llvm.minnum.f128(fp128 %Val0, fp128 %Val1)
declare ppc_fp128 @llvm.minnum.ppcf128(ppc_fp128 %Val0, ppc_fp128 %Val1)
Overview:

The ‘llvm.minnum.*’ intrinsics return the minimum of the twoarguments.

Arguments:

The arguments and return value are floating-point numbers of the sametype.

Semantics:

Follows the IEEE-754 semantics for minNum, except for handling ofsignaling NaNs. This match’s the behavior of libm’s fmin.

If either operand is a NaN, returns the other non-NaN operand. ReturnsNaN only if both operands are NaN. The returned NaN is alwaysquiet. If the operands compare equal, returns a value that comparesequal to both operands. This means that fmin(+/-0.0, +/-0.0) couldreturn either -0.0 or 0.0.

Unlike the IEEE-754 2008 behavior, this does not distinguish betweensignaling and quiet NaN inputs. If a target’s implementation followsthe standard and returns a quiet NaN if either input is a signalingNaN, the intrinsic lowering is responsible for quieting the inputs tocorrectly return the non-NaN input (e.g. by using the equivalent ofllvm.canonicalize).

‘llvm.maxnum.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.maxnum on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.maxnum.f32(float  %Val0, float  %Val1l)
declare double    @llvm.maxnum.f64(double %Val0, double %Val1)
declare x86_fp80  @llvm.maxnum.f80(x86_fp80  %Val0, x86_fp80  %Val1)
declare fp128     @llvm.maxnum.f128(fp128 %Val0, fp128 %Val1)
declare ppc_fp128 @llvm.maxnum.ppcf128(ppc_fp128  %Val0, ppc_fp128  %Val1)
Overview:

The ‘llvm.maxnum.*’ intrinsics return the maximum of the twoarguments.

Arguments:

The arguments and return value are floating-point numbers of the sametype.

Semantics:

Follows the IEEE-754 semantics for maxNum except for the handling ofsignaling NaNs. This matches the behavior of libm’s fmax.

If either operand is a NaN, returns the other non-NaN operand. ReturnsNaN only if both operands are NaN. The returned NaN is alwaysquiet. If the operands compare equal, returns a value that comparesequal to both operands. This means that fmax(+/-0.0, +/-0.0) couldreturn either -0.0 or 0.0.

Unlike the IEEE-754 2008 behavior, this does not distinguish betweensignaling and quiet NaN inputs. If a target’s implementation followsthe standard and returns a quiet NaN if either input is a signalingNaN, the intrinsic lowering is responsible for quieting the inputs tocorrectly return the non-NaN input (e.g. by using the equivalent ofllvm.canonicalize).

‘llvm.minimum.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.minimum on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.minimum.f32(float %Val0, float %Val1)
declare double    @llvm.minimum.f64(double %Val0, double %Val1)
declare x86_fp80  @llvm.minimum.f80(x86_fp80 %Val0, x86_fp80 %Val1)
declare fp128     @llvm.minimum.f128(fp128 %Val0, fp128 %Val1)
declare ppc_fp128 @llvm.minimum.ppcf128(ppc_fp128 %Val0, ppc_fp128 %Val1)
Overview:

The ‘llvm.minimum.*’ intrinsics return the minimum of the twoarguments, propagating NaNs and treating -0.0 as less than +0.0.

Arguments:

The arguments and return value are floating-point numbers of the sametype.

Semantics:

If either operand is a NaN, returns NaN. Otherwise returns the lesserof the two arguments. -0.0 is considered to be less than +0.0 for thisintrinsic. Note that these are the semantics specified in the draft ofIEEE 754-2018.

‘llvm.maximum.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.maximum on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.maximum.f32(float %Val0, float %Val1)
declare double    @llvm.maximum.f64(double %Val0, double %Val1)
declare x86_fp80  @llvm.maximum.f80(x86_fp80 %Val0, x86_fp80 %Val1)
declare fp128     @llvm.maximum.f128(fp128 %Val0, fp128 %Val1)
declare ppc_fp128 @llvm.maximum.ppcf128(ppc_fp128 %Val0, ppc_fp128 %Val1)
Overview:

The ‘llvm.maximum.*’ intrinsics return the maximum of the twoarguments, propagating NaNs and treating -0.0 as less than +0.0.

Arguments:

The arguments and return value are floating-point numbers of the sametype.

Semantics:

If either operand is a NaN, returns NaN. Otherwise returns the greaterof the two arguments. -0.0 is considered to be less than +0.0 for thisintrinsic. Note that these are the semantics specified in the draft ofIEEE 754-2018.

‘llvm.copysign.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.copysign on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.copysign.f32(float  %Mag, float  %Sgn)
declare double    @llvm.copysign.f64(double %Mag, double %Sgn)
declare x86_fp80  @llvm.copysign.f80(x86_fp80  %Mag, x86_fp80  %Sgn)
declare fp128     @llvm.copysign.f128(fp128 %Mag, fp128 %Sgn)
declare ppc_fp128 @llvm.copysign.ppcf128(ppc_fp128  %Mag, ppc_fp128  %Sgn)
Overview:

The ‘llvm.copysign.*’ intrinsics return a value with the magnitude of thefirst operand and the sign of the second operand.

Arguments:

The arguments and return value are floating-point numbers of the sametype.

Semantics:

This function returns the same values as the libm copysignfunctions would, and handles error conditions in the same way.

‘llvm.floor.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.floor on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.floor.f32(float  %Val)
declare double    @llvm.floor.f64(double %Val)
declare x86_fp80  @llvm.floor.f80(x86_fp80  %Val)
declare fp128     @llvm.floor.f128(fp128 %Val)
declare ppc_fp128 @llvm.floor.ppcf128(ppc_fp128  %Val)
Overview:

The ‘llvm.floor.*’ intrinsics return the floor of the operand.

Arguments:

The argument and return value are floating-point numbers of the sametype.

Semantics:

This function returns the same values as the libm floor functionswould, and handles error conditions in the same way.

‘llvm.ceil.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.ceil on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.ceil.f32(float  %Val)
declare double    @llvm.ceil.f64(double %Val)
declare x86_fp80  @llvm.ceil.f80(x86_fp80  %Val)
declare fp128     @llvm.ceil.f128(fp128 %Val)
declare ppc_fp128 @llvm.ceil.ppcf128(ppc_fp128  %Val)
Overview:

The ‘llvm.ceil.*’ intrinsics return the ceiling of the operand.

Arguments:

The argument and return value are floating-point numbers of the sametype.

Semantics:

This function returns the same values as the libm ceil functionswould, and handles error conditions in the same way.

‘llvm.trunc.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.trunc on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.trunc.f32(float  %Val)
declare double    @llvm.trunc.f64(double %Val)
declare x86_fp80  @llvm.trunc.f80(x86_fp80  %Val)
declare fp128     @llvm.trunc.f128(fp128 %Val)
declare ppc_fp128 @llvm.trunc.ppcf128(ppc_fp128  %Val)
Overview:

The ‘llvm.trunc.*’ intrinsics returns the operand rounded to thenearest integer not larger in magnitude than the operand.

Arguments:

The argument and return value are floating-point numbers of the sametype.

Semantics:

This function returns the same values as the libm trunc functionswould, and handles error conditions in the same way.

‘llvm.rint.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.rint on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.rint.f32(float  %Val)
declare double    @llvm.rint.f64(double %Val)
declare x86_fp80  @llvm.rint.f80(x86_fp80  %Val)
declare fp128     @llvm.rint.f128(fp128 %Val)
declare ppc_fp128 @llvm.rint.ppcf128(ppc_fp128  %Val)
Overview:

The ‘llvm.rint.*’ intrinsics returns the operand rounded to thenearest integer. It may raise an inexact floating-point exception if theoperand isn’t an integer.

Arguments:

The argument and return value are floating-point numbers of the sametype.

Semantics:

This function returns the same values as the libm rint functionswould, and handles error conditions in the same way.

‘llvm.nearbyint.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.nearbyint on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.nearbyint.f32(float  %Val)
declare double    @llvm.nearbyint.f64(double %Val)
declare x86_fp80  @llvm.nearbyint.f80(x86_fp80  %Val)
declare fp128     @llvm.nearbyint.f128(fp128 %Val)
declare ppc_fp128 @llvm.nearbyint.ppcf128(ppc_fp128  %Val)
Overview:

The ‘llvm.nearbyint.*’ intrinsics returns the operand rounded to thenearest integer.

Arguments:

The argument and return value are floating-point numbers of the sametype.

Semantics:

This function returns the same values as the libm nearbyintfunctions would, and handles error conditions in the same way.

‘llvm.round.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.round on anyfloating-point or vector of floating-point type. Not all targets supportall types however.

declare float     @llvm.round.f32(float  %Val)
declare double    @llvm.round.f64(double %Val)
declare x86_fp80  @llvm.round.f80(x86_fp80  %Val)
declare fp128     @llvm.round.f128(fp128 %Val)
declare ppc_fp128 @llvm.round.ppcf128(ppc_fp128  %Val)
Overview:

The ‘llvm.round.*’ intrinsics returns the operand rounded to thenearest integer.

Arguments:

The argument and return value are floating-point numbers of the sametype.

Semantics:

This function returns the same values as the libm roundfunctions would, and handles error conditions in the same way.

‘llvm.lround.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.lround on anyfloating-point type. Not all targets support all types however.

declare i32 @llvm.lround.i32.f32(float %Val)
declare i32 @llvm.lround.i32.f64(double %Val)
declare i32 @llvm.lround.i32.f80(float %Val)
declare i32 @llvm.lround.i32.f128(double %Val)
declare i32 @llvm.lround.i32.ppcf128(double %Val)

declare i64 @llvm.lround.i64.f32(float %Val)
declare i64 @llvm.lround.i64.f64(double %Val)
declare i64 @llvm.lround.i64.f80(float %Val)
declare i64 @llvm.lround.i64.f128(double %Val)
declare i64 @llvm.lround.i64.ppcf128(double %Val)
Overview:

The ‘llvm.lround.*’ intrinsics return the operand rounded to the nearestinteger with ties away from zero.

Arguments:

The argument is a floating-point number and the return value is an integertype.

Semantics:

This function returns the same values as the libm lroundfunctions would, but without setting errno.

‘llvm.llround.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.llround on anyfloating-point type. Not all targets support all types however.

declare i64 @llvm.lround.i64.f32(float %Val)
declare i64 @llvm.lround.i64.f64(double %Val)
declare i64 @llvm.lround.i64.f80(float %Val)
declare i64 @llvm.lround.i64.f128(double %Val)
declare i64 @llvm.lround.i64.ppcf128(double %Val)
Overview:

The ‘llvm.llround.*’ intrinsics return the operand rounded to the nearestinteger with ties away from zero.

Arguments:

The argument is a floating-point number and the return value is an integertype.

Semantics:

This function returns the same values as the libm llroundfunctions would, but without setting errno.

‘llvm.lrint.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.lrint on anyfloating-point type. Not all targets support all types however.

declare i32 @llvm.lrint.i32.f32(float %Val)
declare i32 @llvm.lrint.i32.f64(double %Val)
declare i32 @llvm.lrint.i32.f80(float %Val)
declare i32 @llvm.lrint.i32.f128(double %Val)
declare i32 @llvm.lrint.i32.ppcf128(double %Val)

declare i64 @llvm.lrint.i64.f32(float %Val)
declare i64 @llvm.lrint.i64.f64(double %Val)
declare i64 @llvm.lrint.i64.f80(float %Val)
declare i64 @llvm.lrint.i64.f128(double %Val)
declare i64 @llvm.lrint.i64.ppcf128(double %Val)
Overview:

The ‘llvm.lrint.*’ intrinsics return the operand rounded to the nearestinteger.

Arguments:

The argument is a floating-point number and the return value is an integertype.

Semantics:

This function returns the same values as the libm lrintfunctions would, but without setting errno.

‘llvm.llrint.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.llrint on anyfloating-point type. Not all targets support all types however.

declare i64 @llvm.llrint.i64.f32(float %Val)
declare i64 @llvm.llrint.i64.f64(double %Val)
declare i64 @llvm.llrint.i64.f80(float %Val)
declare i64 @llvm.llrint.i64.f128(double %Val)
declare i64 @llvm.llrint.i64.ppcf128(double %Val)
Overview:

The ‘llvm.llrint.*’ intrinsics return the operand rounded to the nearestinteger.

Arguments:

The argument is a floating-point number and the return value is an integertype.

Semantics:

This function returns the same values as the libm llrintfunctions would, but without setting errno.

Bit Manipulation Intrinsics

LLVM provides intrinsics for a few important bit manipulationoperations. These allow efficient code generation for some algorithms.

‘llvm.bitreverse.*’ Intrinsics

Syntax:

This is an overloaded intrinsic function. You can use bitreverse on anyinteger type.

declare i16 @llvm.bitreverse.i16(i16 <id>)
declare i32 @llvm.bitreverse.i32(i32 <id>)
declare i64 @llvm.bitreverse.i64(i64 <id>)
declare <4 x i32> @llvm.bitreverse.v4i32(<4 x i32> <id>)
Overview:

The ‘llvm.bitreverse’ family of intrinsics is used to reverse thebitpattern of an integer value or vector of integer values; for example0b10110110 becomes 0b01101101.

Semantics:

The llvm.bitreverse.iN intrinsic returns an iN value that has bitM in the input moved to bit N-M in the output. The vectorintrinsics, such as llvm.bitreverse.v4i32, operate on a per-elementbasis and the element order is not affected.

‘llvm.bswap.*’ Intrinsics

Syntax:

This is an overloaded intrinsic function. You can use bswap on anyinteger type that is an even number of bytes (i.e. BitWidth % 16 == 0).

declare i16 @llvm.bswap.i16(i16 <id>)
declare i32 @llvm.bswap.i32(i32 <id>)
declare i64 @llvm.bswap.i64(i64 <id>)
declare <4 x i32> @llvm.bswap.v4i32(<4 x i32> <id>)
Overview:

The ‘llvm.bswap’ family of intrinsics is used to byte swap an integervalue or vector of integer values with an even number of bytes (positivemultiple of 16 bits).

Semantics:

The llvm.bswap.i16 intrinsic returns an i16 value that has the highand low byte of the input i16 swapped. Similarly, the llvm.bswap.i32intrinsic returns an i32 value that has the four bytes of the input i32swapped, so that if the input bytes are numbered 0, 1, 2, 3 then thereturned i32 will have its bytes in 3, 2, 1, 0 order. Thellvm.bswap.i48, llvm.bswap.i64 and other intrinsics extend thisconcept to additional even-byte lengths (6 bytes, 8 bytes and more,respectively). The vector intrinsics, such as llvm.bswap.v4i32,operate on a per-element basis and the element order is not affected.

‘llvm.ctpop.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.ctpop on any integerbit width, or on any vector with integer elements. Not all targetssupport all bit widths or vector types, however.

declare i8 @llvm.ctpop.i8(i8  <src>)
declare i16 @llvm.ctpop.i16(i16 <src>)
declare i32 @llvm.ctpop.i32(i32 <src>)
declare i64 @llvm.ctpop.i64(i64 <src>)
declare i256 @llvm.ctpop.i256(i256 <src>)
declare <2 x i32> @llvm.ctpop.v2i32(<2 x i32> <src>)
Overview:

The ‘llvm.ctpop’ family of intrinsics counts the number of bits setin a value.

Arguments:

The only argument is the value to be counted. The argument may be of anyinteger type, or a vector with integer elements. The return type mustmatch the argument type.

Semantics:

The ‘llvm.ctpop’ intrinsic counts the 1’s in a variable, or withineach element of a vector.

‘llvm.ctlz.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.ctlz on anyinteger bit width, or any vector whose elements are integers. Not alltargets support all bit widths or vector types, however.

declare i8   @llvm.ctlz.i8  (i8   <src>, i1 <is_zero_undef>)
declare i16  @llvm.ctlz.i16 (i16  <src>, i1 <is_zero_undef>)
declare i32  @llvm.ctlz.i32 (i32  <src>, i1 <is_zero_undef>)
declare i64  @llvm.ctlz.i64 (i64  <src>, i1 <is_zero_undef>)
declare i256 @llvm.ctlz.i256(i256 <src>, i1 <is_zero_undef>)
declare <2 x i32> @llvm.ctlz.v2i32(<2 x i32> <src>, i1 <is_zero_undef>)
Overview:

The ‘llvm.ctlz’ family of intrinsic functions counts the number ofleading zeros in a variable.

Arguments:

The first argument is the value to be counted. This argument may be ofany integer type, or a vector with integer element type. The returntype must match the first argument type.

The second argument must be a constant and is a flag to indicate whetherthe intrinsic should ensure that a zero as the first argument produces adefined result. Historically some architectures did not provide adefined result for zero values as efficiently, and many algorithms arenow predicated on avoiding zero-value inputs.

Semantics:

The ‘llvm.ctlz’ intrinsic counts the leading (most significant)zeros in a variable, or within each element of the vector. Ifsrc == 0 then the result is the size in bits of the type of srcif is_zero_undef == 0 and undef otherwise. For example,llvm.ctlz(i32 2) = 30.

‘llvm.cttz.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.cttz on anyinteger bit width, or any vector of integer elements. Not all targetssupport all bit widths or vector types, however.

declare i8   @llvm.cttz.i8  (i8   <src>, i1 <is_zero_undef>)
declare i16  @llvm.cttz.i16 (i16  <src>, i1 <is_zero_undef>)
declare i32  @llvm.cttz.i32 (i32  <src>, i1 <is_zero_undef>)
declare i64  @llvm.cttz.i64 (i64  <src>, i1 <is_zero_undef>)
declare i256 @llvm.cttz.i256(i256 <src>, i1 <is_zero_undef>)
declare <2 x i32> @llvm.cttz.v2i32(<2 x i32> <src>, i1 <is_zero_undef>)
Overview:

The ‘llvm.cttz’ family of intrinsic functions counts the number oftrailing zeros.

Arguments:

The first argument is the value to be counted. This argument may be ofany integer type, or a vector with integer element type. The returntype must match the first argument type.

The second argument must be a constant and is a flag to indicate whetherthe intrinsic should ensure that a zero as the first argument produces adefined result. Historically some architectures did not provide adefined result for zero values as efficiently, and many algorithms arenow predicated on avoiding zero-value inputs.

Semantics:

The ‘llvm.cttz’ intrinsic counts the trailing (least significant)zeros in a variable, or within each element of a vector. If src == 0then the result is the size in bits of the type of src ifis_zero_undef == 0 and undef otherwise. For example,llvm.cttz(2) = 1.

‘llvm.fshl.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.fshl on anyinteger bit width or any vector of integer elements. Not all targetssupport all bit widths or vector types, however.

declare i8  @llvm.fshl.i8 (i8 %a, i8 %b, i8 %c)
declare i67 @llvm.fshl.i67(i67 %a, i67 %b, i67 %c)
declare <2 x i32> @llvm.fshl.v2i32(<2 x i32> %a, <2 x i32> %b, <2 x i32> %c)
Overview:

The ‘llvm.fshl’ family of intrinsic functions performs a funnel shift left:the first two values are concatenated as { %a : %b } (%a is the most significantbits of the wide value), the combined value is shifted left, and the mostsignificant bits are extracted to produce a result that is the same size as theoriginal arguments. If the first 2 arguments are identical, this is equivalentto a rotate left operation. For vector types, the operation occurs for eachelement of the vector. The shift argument is treated as an unsigned amountmodulo the element size of the arguments.

Arguments:

The first two arguments are the values to be concatenated. The thirdargument is the shift amount. The arguments may be any integer type or avector with integer element type. All arguments and the return value musthave the same type.

Example:
%r = call i8 @llvm.fshl.i8(i8 %x, i8 %y, i8 %z)  ; %r = i8: msb_extract((concat(x, y) << (z % 8)), 8)
%r = call i8 @llvm.fshl.i8(i8 255, i8 0, i8 15)  ; %r = i8: 128 (0b10000000)
%r = call i8 @llvm.fshl.i8(i8 15, i8 15, i8 11)  ; %r = i8: 120 (0b01111000)
%r = call i8 @llvm.fshl.i8(i8 0, i8 255, i8 8)   ; %r = i8: 0   (0b00000000)

‘llvm.fshr.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.fshr on anyinteger bit width or any vector of integer elements. Not all targetssupport all bit widths or vector types, however.

declare i8  @llvm.fshr.i8 (i8 %a, i8 %b, i8 %c)
declare i67 @llvm.fshr.i67(i67 %a, i67 %b, i67 %c)
declare <2 x i32> @llvm.fshr.v2i32(<2 x i32> %a, <2 x i32> %b, <2 x i32> %c)
Overview:

The ‘llvm.fshr’ family of intrinsic functions performs a funnel shift right:the first two values are concatenated as { %a : %b } (%a is the most significantbits of the wide value), the combined value is shifted right, and the leastsignificant bits are extracted to produce a result that is the same size as theoriginal arguments. If the first 2 arguments are identical, this is equivalentto a rotate right operation. For vector types, the operation occurs for eachelement of the vector. The shift argument is treated as an unsigned amountmodulo the element size of the arguments.

Arguments:

The first two arguments are the values to be concatenated. The thirdargument is the shift amount. The arguments may be any integer type or avector with integer element type. All arguments and the return value musthave the same type.

Example:
%r = call i8 @llvm.fshr.i8(i8 %x, i8 %y, i8 %z)  ; %r = i8: lsb_extract((concat(x, y) >> (z % 8)), 8)
%r = call i8 @llvm.fshr.i8(i8 255, i8 0, i8 15)  ; %r = i8: 254 (0b11111110)
%r = call i8 @llvm.fshr.i8(i8 15, i8 15, i8 11)  ; %r = i8: 225 (0b11100001)
%r = call i8 @llvm.fshr.i8(i8 0, i8 255, i8 8)   ; %r = i8: 255 (0b11111111)

Arithmetic with Overflow Intrinsics

LLVM provides intrinsics for fast arithmetic overflow checking.

Each of these intrinsics returns a two-element struct. The firstelement of this struct contains the result of the correspondingarithmetic operation modulo 2n, where n is the bit width ofthe result. Therefore, for example, the first element of the structreturned by llvm.sadd.with.overflow.i32 is always the same as theresult of a 32-bit add instruction with the same operands, wherethe add is not modified by an nsw or nuw flag.

The second element of the result is an i1 that is 1 if thearithmetic operation overflowed and 0 otherwise. An operationoverflows if, for any values of its operands A and B and forany N larger than the operands’ width, ext(A op B) to iN isnot equal to (ext(A) to iN) op (ext(B) to iN) where ext issext for signed overflow and zext for unsigned overflow, andop is the underlying arithmetic operation.

The behavior of these intrinsics is well-defined for all argumentvalues.

‘llvm.sadd.with.overflow.*’ Intrinsics

Syntax:

This is an overloaded intrinsic. You can use llvm.sadd.with.overflowon any integer bit width or vectors of integers.

declare {i16, i1} @llvm.sadd.with.overflow.i16(i16 %a, i16 %b)
declare {i32, i1} @llvm.sadd.with.overflow.i32(i32 %a, i32 %b)
declare {i64, i1} @llvm.sadd.with.overflow.i64(i64 %a, i64 %b)
declare {<4 x i32>, <4 x i1>} @llvm.sadd.with.overflow.v4i32(<4 x i32> %a, <4 x i32> %b)
Overview:

The ‘llvm.sadd.with.overflow’ family of intrinsic functions performa signed addition of the two arguments, and indicate whether an overflowoccurred during the signed summation.

Arguments:

The arguments (%a and %b) and the first element of the result structuremay be of integer types of any bit width, but they must have the samebit width. The second element of the result structure must be of typei1. %a and %b are the two values that will undergo signedaddition.

Semantics:

The ‘llvm.sadd.with.overflow’ family of intrinsic functions performa signed addition of the two variables. They return a structure — thefirst element of which is the signed summation, and the second elementof which is a bit specifying if the signed summation resulted in anoverflow.

Examples:
%res = call {i32, i1} @llvm.sadd.with.overflow.i32(i32 %a, i32 %b)
%sum = extractvalue {i32, i1} %res, 0
%obit = extractvalue {i32, i1} %res, 1
br i1 %obit, label %overflow, label %normal

‘llvm.uadd.with.overflow.*’ Intrinsics

Syntax:

This is an overloaded intrinsic. You can use llvm.uadd.with.overflowon any integer bit width or vectors of integers.

declare {i16, i1} @llvm.uadd.with.overflow.i16(i16 %a, i16 %b)
declare {i32, i1} @llvm.uadd.with.overflow.i32(i32 %a, i32 %b)
declare {i64, i1} @llvm.uadd.with.overflow.i64(i64 %a, i64 %b)
declare {<4 x i32>, <4 x i1>} @llvm.uadd.with.overflow.v4i32(<4 x i32> %a, <4 x i32> %b)
Overview:

The ‘llvm.uadd.with.overflow’ family of intrinsic functions performan unsigned addition of the two arguments, and indicate whether a carryoccurred during the unsigned summation.

Arguments:

The arguments (%a and %b) and the first element of the result structuremay be of integer types of any bit width, but they must have the samebit width. The second element of the result structure must be of typei1. %a and %b are the two values that will undergo unsignedaddition.

Semantics:

The ‘llvm.uadd.with.overflow’ family of intrinsic functions performan unsigned addition of the two arguments. They return a structure — thefirst element of which is the sum, and the second element of which is abit specifying if the unsigned summation resulted in a carry.

Examples:
%res = call {i32, i1} @llvm.uadd.with.overflow.i32(i32 %a, i32 %b)
%sum = extractvalue {i32, i1} %res, 0
%obit = extractvalue {i32, i1} %res, 1
br i1 %obit, label %carry, label %normal

‘llvm.ssub.with.overflow.*’ Intrinsics

Syntax:

This is an overloaded intrinsic. You can use llvm.ssub.with.overflowon any integer bit width or vectors of integers.

declare {i16, i1} @llvm.ssub.with.overflow.i16(i16 %a, i16 %b)
declare {i32, i1} @llvm.ssub.with.overflow.i32(i32 %a, i32 %b)
declare {i64, i1} @llvm.ssub.with.overflow.i64(i64 %a, i64 %b)
declare {<4 x i32>, <4 x i1>} @llvm.ssub.with.overflow.v4i32(<4 x i32> %a, <4 x i32> %b)
Overview:

The ‘llvm.ssub.with.overflow’ family of intrinsic functions performa signed subtraction of the two arguments, and indicate whether anoverflow occurred during the signed subtraction.

Arguments:

The arguments (%a and %b) and the first element of the result structuremay be of integer types of any bit width, but they must have the samebit width. The second element of the result structure must be of typei1. %a and %b are the two values that will undergo signedsubtraction.

Semantics:

The ‘llvm.ssub.with.overflow’ family of intrinsic functions performa signed subtraction of the two arguments. They return a structure — thefirst element of which is the subtraction, and the second element ofwhich is a bit specifying if the signed subtraction resulted in anoverflow.

Examples:
%res = call {i32, i1} @llvm.ssub.with.overflow.i32(i32 %a, i32 %b)
%sum = extractvalue {i32, i1} %res, 0
%obit = extractvalue {i32, i1} %res, 1
br i1 %obit, label %overflow, label %normal

‘llvm.usub.with.overflow.*’ Intrinsics

Syntax:

This is an overloaded intrinsic. You can use llvm.usub.with.overflowon any integer bit width or vectors of integers.

declare {i16, i1} @llvm.usub.with.overflow.i16(i16 %a, i16 %b)
declare {i32, i1} @llvm.usub.with.overflow.i32(i32 %a, i32 %b)
declare {i64, i1} @llvm.usub.with.overflow.i64(i64 %a, i64 %b)
declare {<4 x i32>, <4 x i1>} @llvm.usub.with.overflow.v4i32(<4 x i32> %a, <4 x i32> %b)
Overview:

The ‘llvm.usub.with.overflow’ family of intrinsic functions performan unsigned subtraction of the two arguments, and indicate whether anoverflow occurred during the unsigned subtraction.

Arguments:

The arguments (%a and %b) and the first element of the result structuremay be of integer types of any bit width, but they must have the samebit width. The second element of the result structure must be of typei1. %a and %b are the two values that will undergo unsignedsubtraction.

Semantics:

The ‘llvm.usub.with.overflow’ family of intrinsic functions performan unsigned subtraction of the two arguments. They return a structure —the first element of which is the subtraction, and the second element ofwhich is a bit specifying if the unsigned subtraction resulted in anoverflow.

Examples:
%res = call {i32, i1} @llvm.usub.with.overflow.i32(i32 %a, i32 %b)
%sum = extractvalue {i32, i1} %res, 0
%obit = extractvalue {i32, i1} %res, 1
br i1 %obit, label %overflow, label %normal

‘llvm.smul.with.overflow.*’ Intrinsics

Syntax:

This is an overloaded intrinsic. You can use llvm.smul.with.overflowon any integer bit width or vectors of integers.

declare {i16, i1} @llvm.smul.with.overflow.i16(i16 %a, i16 %b)
declare {i32, i1} @llvm.smul.with.overflow.i32(i32 %a, i32 %b)
declare {i64, i1} @llvm.smul.with.overflow.i64(i64 %a, i64 %b)
declare {<4 x i32>, <4 x i1>} @llvm.smul.with.overflow.v4i32(<4 x i32> %a, <4 x i32> %b)
Overview:

The ‘llvm.smul.with.overflow’ family of intrinsic functions performa signed multiplication of the two arguments, and indicate whether anoverflow occurred during the signed multiplication.

Arguments:

The arguments (%a and %b) and the first element of the result structuremay be of integer types of any bit width, but they must have the samebit width. The second element of the result structure must be of typei1. %a and %b are the two values that will undergo signedmultiplication.

Semantics:

The ‘llvm.smul.with.overflow’ family of intrinsic functions performa signed multiplication of the two arguments. They return a structure —the first element of which is the multiplication, and the second elementof which is a bit specifying if the signed multiplication resulted in anoverflow.

Examples:
%res = call {i32, i1} @llvm.smul.with.overflow.i32(i32 %a, i32 %b)
%sum = extractvalue {i32, i1} %res, 0
%obit = extractvalue {i32, i1} %res, 1
br i1 %obit, label %overflow, label %normal

‘llvm.umul.with.overflow.*’ Intrinsics

Syntax:

This is an overloaded intrinsic. You can use llvm.umul.with.overflowon any integer bit width or vectors of integers.

declare {i16, i1} @llvm.umul.with.overflow.i16(i16 %a, i16 %b)
declare {i32, i1} @llvm.umul.with.overflow.i32(i32 %a, i32 %b)
declare {i64, i1} @llvm.umul.with.overflow.i64(i64 %a, i64 %b)
declare {<4 x i32>, <4 x i1>} @llvm.umul.with.overflow.v4i32(<4 x i32> %a, <4 x i32> %b)
Overview:

The ‘llvm.umul.with.overflow’ family of intrinsic functions performa unsigned multiplication of the two arguments, and indicate whether anoverflow occurred during the unsigned multiplication.

Arguments:

The arguments (%a and %b) and the first element of the result structuremay be of integer types of any bit width, but they must have the samebit width. The second element of the result structure must be of typei1. %a and %b are the two values that will undergo unsignedmultiplication.

Semantics:

The ‘llvm.umul.with.overflow’ family of intrinsic functions performan unsigned multiplication of the two arguments. They return a structure —the first element of which is the multiplication, and the secondelement of which is a bit specifying if the unsigned multiplicationresulted in an overflow.

Examples:
%res = call {i32, i1} @llvm.umul.with.overflow.i32(i32 %a, i32 %b)
%sum = extractvalue {i32, i1} %res, 0
%obit = extractvalue {i32, i1} %res, 1
br i1 %obit, label %overflow, label %normal

Saturation Arithmetic Intrinsics

Saturation arithmetic is a version of arithmetic in which operations arelimited to a fixed range between a minimum and maximum value. If the result ofan operation is greater than the maximum value, the result is set (or“clamped”) to this maximum. If it is below the minimum, it is clamped to thisminimum.

‘llvm.sadd.sat.*’ Intrinsics

Syntax

This is an overloaded intrinsic. You can use llvm.sadd.saton any integer bit width or vectors of integers.

declare i16 @llvm.sadd.sat.i16(i16 %a, i16 %b)
declare i32 @llvm.sadd.sat.i32(i32 %a, i32 %b)
declare i64 @llvm.sadd.sat.i64(i64 %a, i64 %b)
declare <4 x i32> @llvm.sadd.sat.v4i32(<4 x i32> %a, <4 x i32> %b)
Overview

The ‘llvm.sadd.sat’ family of intrinsic functions perform signedsaturation addition on the 2 arguments.

Arguments

The arguments (%a and %b) and the result may be of integer types of any bitwidth, but they must have the same bit width. %a and %b are the twovalues that will undergo signed addition.

Semantics:

The maximum value this operation can clamp to is the largest signed valuerepresentable by the bit width of the arguments. The minimum value is thesmallest signed value representable by this bit width.

Examples
%res = call i4 @llvm.sadd.sat.i4(i4 1, i4 2)  ; %res = 3
%res = call i4 @llvm.sadd.sat.i4(i4 5, i4 6)  ; %res = 7
%res = call i4 @llvm.sadd.sat.i4(i4 -4, i4 2)  ; %res = -2
%res = call i4 @llvm.sadd.sat.i4(i4 -4, i4 -5)  ; %res = -8

‘llvm.uadd.sat.*’ Intrinsics

Syntax

This is an overloaded intrinsic. You can use llvm.uadd.saton any integer bit width or vectors of integers.

declare i16 @llvm.uadd.sat.i16(i16 %a, i16 %b)
declare i32 @llvm.uadd.sat.i32(i32 %a, i32 %b)
declare i64 @llvm.uadd.sat.i64(i64 %a, i64 %b)
declare <4 x i32> @llvm.uadd.sat.v4i32(<4 x i32> %a, <4 x i32> %b)
Overview

The ‘llvm.uadd.sat’ family of intrinsic functions perform unsignedsaturation addition on the 2 arguments.

Arguments

The arguments (%a and %b) and the result may be of integer types of any bitwidth, but they must have the same bit width. %a and %b are the twovalues that will undergo unsigned addition.

Semantics:

The maximum value this operation can clamp to is the largest unsigned valuerepresentable by the bit width of the arguments. Because this is an unsignedoperation, the result will never saturate towards zero.

Examples
%res = call i4 @llvm.uadd.sat.i4(i4 1, i4 2)  ; %res = 3
%res = call i4 @llvm.uadd.sat.i4(i4 5, i4 6)  ; %res = 11
%res = call i4 @llvm.uadd.sat.i4(i4 8, i4 8)  ; %res = 15

‘llvm.ssub.sat.*’ Intrinsics

Syntax

This is an overloaded intrinsic. You can use llvm.ssub.saton any integer bit width or vectors of integers.

declare i16 @llvm.ssub.sat.i16(i16 %a, i16 %b)
declare i32 @llvm.ssub.sat.i32(i32 %a, i32 %b)
declare i64 @llvm.ssub.sat.i64(i64 %a, i64 %b)
declare <4 x i32> @llvm.ssub.sat.v4i32(<4 x i32> %a, <4 x i32> %b)
Overview

The ‘llvm.ssub.sat’ family of intrinsic functions perform signedsaturation subtraction on the 2 arguments.

Arguments

The arguments (%a and %b) and the result may be of integer types of any bitwidth, but they must have the same bit width. %a and %b are the twovalues that will undergo signed subtraction.

Semantics:

The maximum value this operation can clamp to is the largest signed valuerepresentable by the bit width of the arguments. The minimum value is thesmallest signed value representable by this bit width.

Examples
%res = call i4 @llvm.ssub.sat.i4(i4 2, i4 1)  ; %res = 1
%res = call i4 @llvm.ssub.sat.i4(i4 2, i4 6)  ; %res = -4
%res = call i4 @llvm.ssub.sat.i4(i4 -4, i4 5)  ; %res = -8
%res = call i4 @llvm.ssub.sat.i4(i4 4, i4 -5)  ; %res = 7

‘llvm.usub.sat.*’ Intrinsics

Syntax

This is an overloaded intrinsic. You can use llvm.usub.saton any integer bit width or vectors of integers.

declare i16 @llvm.usub.sat.i16(i16 %a, i16 %b)
declare i32 @llvm.usub.sat.i32(i32 %a, i32 %b)
declare i64 @llvm.usub.sat.i64(i64 %a, i64 %b)
declare <4 x i32> @llvm.usub.sat.v4i32(<4 x i32> %a, <4 x i32> %b)
Overview

The ‘llvm.usub.sat’ family of intrinsic functions perform unsignedsaturation subtraction on the 2 arguments.

Arguments

The arguments (%a and %b) and the result may be of integer types of any bitwidth, but they must have the same bit width. %a and %b are the twovalues that will undergo unsigned subtraction.

Semantics:

The minimum value this operation can clamp to is 0, which is the smallestunsigned value representable by the bit width of the unsigned arguments.Because this is an unsigned operation, the result will never saturate towardsthe largest possible value representable by this bit width.

Examples
%res = call i4 @llvm.usub.sat.i4(i4 2, i4 1)  ; %res = 1
%res = call i4 @llvm.usub.sat.i4(i4 2, i4 6)  ; %res = 0

Fixed Point Arithmetic Intrinsics

A fixed point number represents a real data type for a number that has a fixednumber of digits after a radix point (equivalent to the decimal point ‘.’).The number of digits after the radix point is referred as the scale. Theseare useful for representing fractional values to a specific precision. Thefollowing intrinsics perform fixed point arithmetic operations on 2 operandsof the same scale, specified as the third argument.

The llvm.*mul.fix family of intrinsic functions represents a multiplicationof fixed point numbers through scaled integers. Therefore, fixed pointmultiplication can be represented as

%result = call i4 @llvm.smul.fix.i4(i4 %a, i4 %b, i32 %scale)

; Expands to
%a2 = sext i4 %a to i8
%b2 = sext i4 %b to i8
%mul = mul nsw nuw i8 %a, %b
%scale2 = trunc i32 %scale to i8
%r = ashr i8 %mul, i8 %scale2  ; this is for a target rounding down towards negative infinity
%result = trunc i8 %r to i4

The llvm.*div.fix family of intrinsic functions represents a division offixed point numbers through scaled integers. Fixed point division can berepresented as:

%result call i4 @llvm.sdiv.fix.i4(i4 %a, i4 %b, i32 %scale)

; Expands to
%a2 = sext i4 %a to i8
%b2 = sext i4 %b to i8
%scale2 = trunc i32 %scale to i8
%a3 = shl i8 %a2, %scale2
%r = sdiv i8 %a3, %b2 ; this is for a target rounding towards zero
%result = trunc i8 %r to i4

For each of these functions, if the result cannot be represented exactly withthe provided scale, the result is rounded. Rounding is unspecified sincepreferred rounding may vary for different targets. Rounding is specifiedthrough a target hook. Different pipelines should legalize or optimize thisusing the rounding specified by this hook if it is provided. Operations likeconstant folding, instruction combining, KnownBits, and ValueTracking shouldalso use this hook, if provided, and not assume the direction of rounding. Arounded result must always be within one unit of precision from the trueresult. That is, the error between the returned result and the true result mustbe less than 1/2^(scale).

‘llvm.smul.fix.*’ Intrinsics

Syntax

This is an overloaded intrinsic. You can use llvm.smul.fixon any integer bit width or vectors of integers.

declare i16 @llvm.smul.fix.i16(i16 %a, i16 %b, i32 %scale)
declare i32 @llvm.smul.fix.i32(i32 %a, i32 %b, i32 %scale)
declare i64 @llvm.smul.fix.i64(i64 %a, i64 %b, i32 %scale)
declare <4 x i32> @llvm.smul.fix.v4i32(<4 x i32> %a, <4 x i32> %b, i32 %scale)
Overview

The ‘llvm.smul.fix’ family of intrinsic functions perform signedfixed point multiplication on 2 arguments of the same scale.

Arguments

The arguments (%a and %b) and the result may be of integer types of any bitwidth, but they must have the same bit width. The arguments may also work withint vectors of the same length and int size. %a and %b are the twovalues that will undergo signed fixed point multiplication. The argument%scale represents the scale of both operands, and must be a constantinteger.

Semantics:

This operation performs fixed point multiplication on the 2 arguments of aspecified scale. The result will also be returned in the same scale specifiedin the third argument.

If the result value cannot be precisely represented in the given scale, thevalue is rounded up or down to the closest representable value. The roundingdirection is unspecified.

It is undefined behavior if the result value does not fit within the range ofthe fixed point type.

Examples
%res = call i4 @llvm.smul.fix.i4(i4 3, i4 2, i32 0)  ; %res = 6 (2 x 3 = 6)
%res = call i4 @llvm.smul.fix.i4(i4 3, i4 2, i32 1)  ; %res = 3 (1.5 x 1 = 1.5)
%res = call i4 @llvm.smul.fix.i4(i4 3, i4 -2, i32 1)  ; %res = -3 (1.5 x -1 = -1.5)

; The result in the following could be rounded up to -2 or down to -2.5
%res = call i4 @llvm.smul.fix.i4(i4 3, i4 -3, i32 1)  ; %res = -5 (or -4) (1.5 x -1.5 = -2.25)

‘llvm.umul.fix.*’ Intrinsics

Syntax

This is an overloaded intrinsic. You can use llvm.umul.fixon any integer bit width or vectors of integers.

declare i16 @llvm.umul.fix.i16(i16 %a, i16 %b, i32 %scale)
declare i32 @llvm.umul.fix.i32(i32 %a, i32 %b, i32 %scale)
declare i64 @llvm.umul.fix.i64(i64 %a, i64 %b, i32 %scale)
declare <4 x i32> @llvm.umul.fix.v4i32(<4 x i32> %a, <4 x i32> %b, i32 %scale)
Overview

The ‘llvm.umul.fix’ family of intrinsic functions perform unsignedfixed point multiplication on 2 arguments of the same scale.

Arguments

The arguments (%a and %b) and the result may be of integer types of any bitwidth, but they must have the same bit width. The arguments may also work withint vectors of the same length and int size. %a and %b are the twovalues that will undergo unsigned fixed point multiplication. The argument%scale represents the scale of both operands, and must be a constantinteger.

Semantics:

This operation performs unsigned fixed point multiplication on the 2 arguments of aspecified scale. The result will also be returned in the same scale specifiedin the third argument.

If the result value cannot be precisely represented in the given scale, thevalue is rounded up or down to the closest representable value. The roundingdirection is unspecified.

It is undefined behavior if the result value does not fit within the range ofthe fixed point type.

Examples
%res = call i4 @llvm.umul.fix.i4(i4 3, i4 2, i32 0)  ; %res = 6 (2 x 3 = 6)
%res = call i4 @llvm.umul.fix.i4(i4 3, i4 2, i32 1)  ; %res = 3 (1.5 x 1 = 1.5)

; The result in the following could be rounded down to 3.5 or up to 4
%res = call i4 @llvm.umul.fix.i4(i4 15, i4 1, i32 1)  ; %res = 7 (or 8) (7.5 x 0.5 = 3.75)

‘llvm.smul.fix.sat.*’ Intrinsics

Syntax

This is an overloaded intrinsic. You can use llvm.smul.fix.saton any integer bit width or vectors of integers.

declare i16 @llvm.smul.fix.sat.i16(i16 %a, i16 %b, i32 %scale)
declare i32 @llvm.smul.fix.sat.i32(i32 %a, i32 %b, i32 %scale)
declare i64 @llvm.smul.fix.sat.i64(i64 %a, i64 %b, i32 %scale)
declare <4 x i32> @llvm.smul.fix.sat.v4i32(<4 x i32> %a, <4 x i32> %b, i32 %scale)
Overview

The ‘llvm.smul.fix.sat’ family of intrinsic functions perform signedfixed point saturation multiplication on 2 arguments of the same scale.

Arguments

The arguments (%a and %b) and the result may be of integer types of any bitwidth, but they must have the same bit width. %a and %b are the twovalues that will undergo signed fixed point multiplication. The argument%scale represents the scale of both operands, and must be a constantinteger.

Semantics:

This operation performs fixed point multiplication on the 2 arguments of aspecified scale. The result will also be returned in the same scale specifiedin the third argument.

If the result value cannot be precisely represented in the given scale, thevalue is rounded up or down to the closest representable value. The roundingdirection is unspecified.

The maximum value this operation can clamp to is the largest signed valuerepresentable by the bit width of the first 2 arguments. The minimum value is thesmallest signed value representable by this bit width.

Examples
%res = call i4 @llvm.smul.fix.sat.i4(i4 3, i4 2, i32 0)  ; %res = 6 (2 x 3 = 6)
%res = call i4 @llvm.smul.fix.sat.i4(i4 3, i4 2, i32 1)  ; %res = 3 (1.5 x 1 = 1.5)
%res = call i4 @llvm.smul.fix.sat.i4(i4 3, i4 -2, i32 1)  ; %res = -3 (1.5 x -1 = -1.5)

; The result in the following could be rounded up to -2 or down to -2.5
%res = call i4 @llvm.smul.fix.sat.i4(i4 3, i4 -3, i32 1)  ; %res = -5 (or -4) (1.5 x -1.5 = -2.25)

; Saturation
%res = call i4 @llvm.smul.fix.sat.i4(i4 7, i4 2, i32 0)  ; %res = 7
%res = call i4 @llvm.smul.fix.sat.i4(i4 7, i4 4, i32 2)  ; %res = 7
%res = call i4 @llvm.smul.fix.sat.i4(i4 -8, i4 5, i32 2)  ; %res = -8
%res = call i4 @llvm.smul.fix.sat.i4(i4 -8, i4 -2, i32 1)  ; %res = 7

; Scale can affect the saturation result
%res = call i4 @llvm.smul.fix.sat.i4(i4 2, i4 4, i32 0)  ; %res = 7 (2 x 4 -> clamped to 7)
%res = call i4 @llvm.smul.fix.sat.i4(i4 2, i4 4, i32 1)  ; %res = 4 (1 x 2 = 2)

‘llvm.umul.fix.sat.*’ Intrinsics

Syntax

This is an overloaded intrinsic. You can use llvm.umul.fix.saton any integer bit width or vectors of integers.

declare i16 @llvm.umul.fix.sat.i16(i16 %a, i16 %b, i32 %scale)
declare i32 @llvm.umul.fix.sat.i32(i32 %a, i32 %b, i32 %scale)
declare i64 @llvm.umul.fix.sat.i64(i64 %a, i64 %b, i32 %scale)
declare <4 x i32> @llvm.umul.fix.sat.v4i32(<4 x i32> %a, <4 x i32> %b, i32 %scale)
Overview

The ‘llvm.umul.fix.sat’ family of intrinsic functions perform unsignedfixed point saturation multiplication on 2 arguments of the same scale.

Arguments

The arguments (%a and %b) and the result may be of integer types of any bitwidth, but they must have the same bit width. %a and %b are the twovalues that will undergo unsigned fixed point multiplication. The argument%scale represents the scale of both operands, and must be a constantinteger.

Semantics:

This operation performs fixed point multiplication on the 2 arguments of aspecified scale. The result will also be returned in the same scale specifiedin the third argument.

If the result value cannot be precisely represented in the given scale, thevalue is rounded up or down to the closest representable value. The roundingdirection is unspecified.

The maximum value this operation can clamp to is the largest unsigned valuerepresentable by the bit width of the first 2 arguments. The minimum value is thesmallest unsigned value representable by this bit width (zero).

Examples
%res = call i4 @llvm.umul.fix.sat.i4(i4 3, i4 2, i32 0)  ; %res = 6 (2 x 3 = 6)
%res = call i4 @llvm.umul.fix.sat.i4(i4 3, i4 2, i32 1)  ; %res = 3 (1.5 x 1 = 1.5)

; The result in the following could be rounded down to 2 or up to 2.5
%res = call i4 @llvm.umul.fix.sat.i4(i4 3, i4 3, i32 1)  ; %res = 4 (or 5) (1.5 x 1.5 = 2.25)

; Saturation
%res = call i4 @llvm.umul.fix.sat.i4(i4 8, i4 2, i32 0)  ; %res = 15 (8 x 2 -> clamped to 15)
%res = call i4 @llvm.umul.fix.sat.i4(i4 8, i4 8, i32 2)  ; %res = 15 (2 x 2 -> clamped to 3.75)

; Scale can affect the saturation result
%res = call i4 @llvm.umul.fix.sat.i4(i4 2, i4 4, i32 0)  ; %res = 7 (2 x 4 -> clamped to 7)
%res = call i4 @llvm.umul.fix.sat.i4(i4 2, i4 4, i32 1)  ; %res = 4 (1 x 2 = 2)

‘llvm.sdiv.fix.*’ Intrinsics

Syntax

This is an overloaded intrinsic. You can use llvm.sdiv.fixon any integer bit width or vectors of integers.

declare i16 @llvm.sdiv.fix.i16(i16 %a, i16 %b, i32 %scale)
declare i32 @llvm.sdiv.fix.i32(i32 %a, i32 %b, i32 %scale)
declare i64 @llvm.sdiv.fix.i64(i64 %a, i64 %b, i32 %scale)
declare <4 x i32> @llvm.sdiv.fix.v4i32(<4 x i32> %a, <4 x i32> %b, i32 %scale)
Overview

The ‘llvm.sdiv.fix’ family of intrinsic functions perform signedfixed point division on 2 arguments of the same scale.

Arguments

The arguments (%a and %b) and the result may be of integer types of any bitwidth, but they must have the same bit width. The arguments may also work withint vectors of the same length and int size. %a and %b are the twovalues that will undergo signed fixed point division. The argument%scale represents the scale of both operands, and must be a constantinteger.

Semantics:

This operation performs fixed point division on the 2 arguments of aspecified scale. The result will also be returned in the same scale specifiedin the third argument.

If the result value cannot be precisely represented in the given scale, thevalue is rounded up or down to the closest representable value. The roundingdirection is unspecified.

It is undefined behavior if the result value does not fit within the range ofthe fixed point type, or if the second argument is zero.

Examples
%res = call i4 @llvm.sdiv.fix.i4(i4 6, i4 2, i32 0)  ; %res = 3 (6 / 2 = 3)
%res = call i4 @llvm.sdiv.fix.i4(i4 6, i4 4, i32 1)  ; %res = 3 (3 / 2 = 1.5)
%res = call i4 @llvm.sdiv.fix.i4(i4 3, i4 -2, i32 1) ; %res = -3 (1.5 / -1 = -1.5)

; The result in the following could be rounded up to 1 or down to 0.5
%res = call i4 @llvm.sdiv.fix.i4(i4 3, i4 4, i32 1)  ; %res = 2 (or 1) (1.5 / 2 = 0.75)

‘llvm.udiv.fix.*’ Intrinsics

Syntax

This is an overloaded intrinsic. You can use llvm.udiv.fixon any integer bit width or vectors of integers.

declare i16 @llvm.udiv.fix.i16(i16 %a, i16 %b, i32 %scale)
declare i32 @llvm.udiv.fix.i32(i32 %a, i32 %b, i32 %scale)
declare i64 @llvm.udiv.fix.i64(i64 %a, i64 %b, i32 %scale)
declare <4 x i32> @llvm.udiv.fix.v4i32(<4 x i32> %a, <4 x i32> %b, i32 %scale)
Overview

The ‘llvm.udiv.fix’ family of intrinsic functions perform unsignedfixed point division on 2 arguments of the same scale.

Arguments

The arguments (%a and %b) and the result may be of integer types of any bitwidth, but they must have the same bit width. The arguments may also work withint vectors of the same length and int size. %a and %b are the twovalues that will undergo unsigned fixed point division. The argument%scale represents the scale of both operands, and must be a constantinteger.

Semantics:

This operation performs fixed point division on the 2 arguments of aspecified scale. The result will also be returned in the same scale specifiedin the third argument.

If the result value cannot be precisely represented in the given scale, thevalue is rounded up or down to the closest representable value. The roundingdirection is unspecified.

It is undefined behavior if the result value does not fit within the range ofthe fixed point type, or if the second argument is zero.

Examples
%res = call i4 @llvm.udiv.fix.i4(i4 6, i4 2, i32 0)  ; %res = 3 (6 / 2 = 3)
%res = call i4 @llvm.udiv.fix.i4(i4 6, i4 4, i32 1)  ; %res = 3 (3 / 2 = 1.5)
%res = call i4 @llvm.udiv.fix.i4(i4 1, i4 -8, i32 4) ; %res = 2 (0.0625 / 0.5 = 0.125)

; The result in the following could be rounded up to 1 or down to 0.5
%res = call i4 @llvm.udiv.fix.i4(i4 3, i4 4, i32 1)  ; %res = 2 (or 1) (1.5 / 2 = 0.75)

‘llvm.sdiv.fix.sat.*’ Intrinsics

Syntax

This is an overloaded intrinsic. You can use llvm.sdiv.fix.saton any integer bit width or vectors of integers.

declare i16 @llvm.sdiv.fix.sat.i16(i16 %a, i16 %b, i32 %scale)
declare i32 @llvm.sdiv.fix.sat.i32(i32 %a, i32 %b, i32 %scale)
declare i64 @llvm.sdiv.fix.sat.i64(i64 %a, i64 %b, i32 %scale)
declare <4 x i32> @llvm.sdiv.fix.sat.v4i32(<4 x i32> %a, <4 x i32> %b, i32 %scale)
Overview

The ‘llvm.sdiv.fix.sat’ family of intrinsic functions perform signedfixed point saturation division on 2 arguments of the same scale.

Arguments

The arguments (%a and %b) and the result may be of integer types of any bitwidth, but they must have the same bit width. %a and %b are the twovalues that will undergo signed fixed point division. The argument%scale represents the scale of both operands, and must be a constantinteger.

Semantics:

This operation performs fixed point division on the 2 arguments of aspecified scale. The result will also be returned in the same scale specifiedin the third argument.

If the result value cannot be precisely represented in the given scale, thevalue is rounded up or down to the closest representable value. The roundingdirection is unspecified.

The maximum value this operation can clamp to is the largest signed valuerepresentable by the bit width of the first 2 arguments. The minimum value is thesmallest signed value representable by this bit width.

It is undefined behavior if the second argument is zero.

Examples
%res = call i4 @llvm.sdiv.fix.sat.i4(i4 6, i4 2, i32 0)  ; %res = 3 (6 / 2 = 3)
%res = call i4 @llvm.sdiv.fix.sat.i4(i4 6, i4 4, i32 1)  ; %res = 3 (3 / 2 = 1.5)
%res = call i4 @llvm.sdiv.fix.sat.i4(i4 3, i4 -2, i32 1) ; %res = -3 (1.5 / -1 = -1.5)

; The result in the following could be rounded up to 1 or down to 0.5
%res = call i4 @llvm.sdiv.fix.sat.i4(i4 3, i4 4, i32 1)  ; %res = 2 (or 1) (1.5 / 2 = 0.75)

; Saturation
%res = call i4 @llvm.sdiv.fix.sat.i4(i4 -8, i4 -1, i32 0)  ; %res = 7 (-8 / -1 = 8 => 7)
%res = call i4 @llvm.sdiv.fix.sat.i4(i4 4, i4 2, i32 2)  ; %res = 7 (1 / 0.5 = 2 => 1.75)
%res = call i4 @llvm.sdiv.fix.sat.i4(i4 -4, i4 1, i32 2)  ; %res = -8 (-1 / 0.25 = -4 => -2)

‘llvm.udiv.fix.sat.*’ Intrinsics

Syntax

This is an overloaded intrinsic. You can use llvm.udiv.fix.saton any integer bit width or vectors of integers.

declare i16 @llvm.udiv.fix.sat.i16(i16 %a, i16 %b, i32 %scale)
declare i32 @llvm.udiv.fix.sat.i32(i32 %a, i32 %b, i32 %scale)
declare i64 @llvm.udiv.fix.sat.i64(i64 %a, i64 %b, i32 %scale)
declare <4 x i32> @llvm.udiv.fix.sat.v4i32(<4 x i32> %a, <4 x i32> %b, i32 %scale)
Overview

The ‘llvm.udiv.fix.sat’ family of intrinsic functions perform unsignedfixed point saturation division on 2 arguments of the same scale.

Arguments

The arguments (%a and %b) and the result may be of integer types of any bitwidth, but they must have the same bit width. %a and %b are the twovalues that will undergo unsigned fixed point division. The argument%scale represents the scale of both operands, and must be a constantinteger.

Semantics:

This operation performs fixed point division on the 2 arguments of aspecified scale. The result will also be returned in the same scale specifiedin the third argument.

If the result value cannot be precisely represented in the given scale, thevalue is rounded up or down to the closest representable value. The roundingdirection is unspecified.

The maximum value this operation can clamp to is the largest unsigned valuerepresentable by the bit width of the first 2 arguments. The minimum value is thesmallest unsigned value representable by this bit width (zero).

It is undefined behavior if the second argument is zero.

Examples
%res = call i4 @llvm.udiv.fix.sat.i4(i4 6, i4 2, i32 0)  ; %res = 3 (6 / 2 = 3)
%res = call i4 @llvm.udiv.fix.sat.i4(i4 6, i4 4, i32 1)  ; %res = 3 (3 / 2 = 1.5)

; The result in the following could be rounded down to 0.5 or up to 1
%res = call i4 @llvm.udiv.fix.sat.i4(i4 3, i4 4, i32 1)  ; %res = 1 (or 2) (1.5 / 2 = 0.75)

; Saturation
%res = call i4 @llvm.udiv.fix.sat.i4(i4 8, i4 2, i32 2)  ; %res = 15 (2 / 0.5 = 4 => 3.75)

Specialised Arithmetic Intrinsics

‘llvm.canonicalize.*’ Intrinsic

Syntax:
declare float @llvm.canonicalize.f32(float %a)
declare double @llvm.canonicalize.f64(double %b)
Overview:

The ‘llvm.canonicalize.*’ intrinsic returns the platform specific canonicalencoding of a floating-point number. This canonicalization is useful forimplementing certain numeric primitives such as frexp. The canonical encoding isdefined by IEEE-754-2008 to be:

2.1.8 canonical encoding: The preferred encoding of a floating-point
representation in a format. Applied to declets, significands of finite
numbers, infinities, and NaNs, especially in decimal formats.

This operation can also be considered equivalent to the IEEE-754-2008conversion of a floating-point value to the same format. NaNs are handledaccording to section 6.2.

Examples of non-canonical encodings:

  • x87 pseudo denormals, pseudo NaNs, pseudo Infinity, Unnormals. These areconverted to a canonical representation per hardware-specific protocol.
  • Many normal decimal floating-point numbers have non-canonical alternativeencodings.
  • Some machines, like GPUs or ARMv7 NEON, do not support subnormal values.These are treated as non-canonical encodings of zero and will be flushed toa zero of the same sign by this operation.

Note that per IEEE-754-2008 6.2, systems that support signaling NaNs withdefault exception handling must signal an invalid exception, and produce aquiet NaN result.

This function should always be implementable as multiplication by 1.0, providedthat the compiler does not constant fold the operation. Likewise, division by1.0 and llvm.minnum(x, x) are possible implementations. Addition with-0.0 is also sufficient provided that the rounding mode is not -Infinity.

@llvm.canonicalize must preserve the equality relation. That is:

  • (@llvm.canonicalize(x) == x) is equivalent to (x == x)
  • (@llvm.canonicalize(x) == @llvm.canonicalize(y)) is equivalent toto (x == y)

Additionally, the sign of zero must be conserved:@llvm.canonicalize(-0.0) = -0.0 and @llvm.canonicalize(+0.0) = +0.0

The payload bits of a NaN must be conserved, with two exceptions.First, environments which use only a single canonical representation of NaNmust perform said canonicalization. Second, SNaNs must be quieted per theusual methods.

The canonicalization operation may be optimized away if:

  • The input is known to be canonical. For example, it was produced by afloating-point operation that is required by the standard to be canonical.
  • The result is consumed only by (or fused with) other floating-pointoperations. That is, the bits of the floating-point value are not examined.

‘llvm.fmuladd.*’ Intrinsic

Syntax:
declare float @llvm.fmuladd.f32(float %a, float %b, float %c)
declare double @llvm.fmuladd.f64(double %a, double %b, double %c)
Overview:

The ‘llvm.fmuladd.*’ intrinsic functions represent multiply-addexpressions that can be fused if the code generator determines that (a) thetarget instruction set has support for a fused operation, and (b) that thefused operation is more efficient than the equivalent, separate pair of muland add instructions.

Arguments:

The ‘llvm.fmuladd.*’ intrinsics each take three arguments: twomultiplicands, a and b, and an addend c.

Semantics:

The expression:

%0 = call float @llvm.fmuladd.f32(%a, %b, %c)

is equivalent to the expression a b + c, except that it is unspecifiedwhether rounding will be performed between the multiplication and additionsteps. Fusion is not guaranteed, even if the target platform supports it.If a fused multiply-add is required, the correspondingllvm.fma intrinsic function should be used instead.This never sets errno, just as ‘llvm.fma.’.

Examples:
%r2 = call float @llvm.fmuladd.f32(float %a, float %b, float %c) ; yields float:r2 = (a * b) + c

Experimental Vector Reduction Intrinsics

Horizontal reductions of vectors can be expressed using the followingintrinsics. Each one takes a vector operand as an input and applies itsrespective operation across all elements of the vector, returning a singlescalar result of the same element type.

‘llvm.experimental.vector.reduce.add.*’ Intrinsic

Syntax:
declare i32 @llvm.experimental.vector.reduce.add.v4i32(<4 x i32> %a)
declare i64 @llvm.experimental.vector.reduce.add.v2i64(<2 x i64> %a)
Overview:

The ‘llvm.experimental.vector.reduce.add.*’ intrinsics do an integer ADDreduction of a vector, returning the result as a scalar. The return type matchesthe element-type of the vector input.

Arguments:

The argument to this intrinsic must be a vector of integer values.

‘llvm.experimental.vector.reduce.v2.fadd.*’ Intrinsic

Syntax:
declare float @llvm.experimental.vector.reduce.v2.fadd.f32.v4f32(float %start_value, <4 x float> %a)
declare double @llvm.experimental.vector.reduce.v2.fadd.f64.v2f64(double %start_value, <2 x double> %a)
Overview:

The ‘llvm.experimental.vector.reduce.v2.fadd.*’ intrinsics do a floating-pointADD reduction of a vector, returning the result as a scalar. The return typematches the element-type of the vector input.

If the intrinsic call has the ‘reassoc’ or ‘fast’ flags set, then thereduction will not preserve the associativity of an equivalent scalarizedcounterpart. Otherwise the reduction will be ordered, thus implying thatthe operation respects the associativity of a scalarized reduction.

Arguments:

The first argument to this intrinsic is a scalar start value for the reduction.The type of the start value matches the element-type of the vector input.The second argument must be a vector of floating-point values.

Examples:
%unord = call reassoc float @llvm.experimental.vector.reduce.v2.fadd.f32.v4f32(float 0.0, <4 x float> %input) ; unordered reduction
%ord = call float @llvm.experimental.vector.reduce.v2.fadd.f32.v4f32(float %start_value, <4 x float> %input) ; ordered reduction

‘llvm.experimental.vector.reduce.mul.*’ Intrinsic

Syntax:
declare i32 @llvm.experimental.vector.reduce.mul.v4i32(<4 x i32> %a)
declare i64 @llvm.experimental.vector.reduce.mul.v2i64(<2 x i64> %a)
Overview:

The ‘llvm.experimental.vector.reduce.mul.*’ intrinsics do an integer MULreduction of a vector, returning the result as a scalar. The return type matchesthe element-type of the vector input.

Arguments:

The argument to this intrinsic must be a vector of integer values.

‘llvm.experimental.vector.reduce.v2.fmul.*’ Intrinsic

Syntax:
declare float @llvm.experimental.vector.reduce.v2.fmul.f32.v4f32(float %start_value, <4 x float> %a)
declare double @llvm.experimental.vector.reduce.v2.fmul.f64.v2f64(double %start_value, <2 x double> %a)
Overview:

The ‘llvm.experimental.vector.reduce.v2.fmul.*’ intrinsics do a floating-pointMUL reduction of a vector, returning the result as a scalar. The return typematches the element-type of the vector input.

If the intrinsic call has the ‘reassoc’ or ‘fast’ flags set, then thereduction will not preserve the associativity of an equivalent scalarizedcounterpart. Otherwise the reduction will be ordered, thus implying thatthe operation respects the associativity of a scalarized reduction.

Arguments:

The first argument to this intrinsic is a scalar start value for the reduction.The type of the start value matches the element-type of the vector input.The second argument must be a vector of floating-point values.

Examples:
%unord = call reassoc float @llvm.experimental.vector.reduce.v2.fmul.f32.v4f32(float 1.0, <4 x float> %input) ; unordered reduction
%ord = call float @llvm.experimental.vector.reduce.v2.fmul.f32.v4f32(float %start_value, <4 x float> %input) ; ordered reduction

‘llvm.experimental.vector.reduce.and.*’ Intrinsic

Syntax:
declare i32 @llvm.experimental.vector.reduce.and.v4i32(<4 x i32> %a)
Overview:

The ‘llvm.experimental.vector.reduce.and.*’ intrinsics do a bitwise ANDreduction of a vector, returning the result as a scalar. The return type matchesthe element-type of the vector input.

Arguments:

The argument to this intrinsic must be a vector of integer values.

‘llvm.experimental.vector.reduce.or.*’ Intrinsic

Syntax:
declare i32 @llvm.experimental.vector.reduce.or.v4i32(<4 x i32> %a)
Overview:

The ‘llvm.experimental.vector.reduce.or.*’ intrinsics do a bitwise OR reductionof a vector, returning the result as a scalar. The return type matches theelement-type of the vector input.

Arguments:

The argument to this intrinsic must be a vector of integer values.

‘llvm.experimental.vector.reduce.xor.*’ Intrinsic

Syntax:
declare i32 @llvm.experimental.vector.reduce.xor.v4i32(<4 x i32> %a)
Overview:

The ‘llvm.experimental.vector.reduce.xor.*’ intrinsics do a bitwise XORreduction of a vector, returning the result as a scalar. The return type matchesthe element-type of the vector input.

Arguments:

The argument to this intrinsic must be a vector of integer values.

‘llvm.experimental.vector.reduce.smax.*’ Intrinsic

Syntax:
declare i32 @llvm.experimental.vector.reduce.smax.v4i32(<4 x i32> %a)
Overview:

The ‘llvm.experimental.vector.reduce.smax.*’ intrinsics do a signed integerMAX reduction of a vector, returning the result as a scalar. The return typematches the element-type of the vector input.

Arguments:

The argument to this intrinsic must be a vector of integer values.

‘llvm.experimental.vector.reduce.smin.*’ Intrinsic

Syntax:
declare i32 @llvm.experimental.vector.reduce.smin.v4i32(<4 x i32> %a)
Overview:

The ‘llvm.experimental.vector.reduce.smin.*’ intrinsics do a signed integerMIN reduction of a vector, returning the result as a scalar. The return typematches the element-type of the vector input.

Arguments:

The argument to this intrinsic must be a vector of integer values.

‘llvm.experimental.vector.reduce.umax.*’ Intrinsic

Syntax:
declare i32 @llvm.experimental.vector.reduce.umax.v4i32(<4 x i32> %a)
Overview:

The ‘llvm.experimental.vector.reduce.umax.*’ intrinsics do an unsignedinteger MAX reduction of a vector, returning the result as a scalar. Thereturn type matches the element-type of the vector input.

Arguments:

The argument to this intrinsic must be a vector of integer values.

‘llvm.experimental.vector.reduce.umin.*’ Intrinsic

Syntax:
declare i32 @llvm.experimental.vector.reduce.umin.v4i32(<4 x i32> %a)
Overview:

The ‘llvm.experimental.vector.reduce.umin.*’ intrinsics do an unsignedinteger MIN reduction of a vector, returning the result as a scalar. Thereturn type matches the element-type of the vector input.

Arguments:

The argument to this intrinsic must be a vector of integer values.

‘llvm.experimental.vector.reduce.fmax.*’ Intrinsic

Syntax:
declare float @llvm.experimental.vector.reduce.fmax.v4f32(<4 x float> %a)
declare double @llvm.experimental.vector.reduce.fmax.v2f64(<2 x double> %a)
Overview:

The ‘llvm.experimental.vector.reduce.fmax.*’ intrinsics do a floating-pointMAX reduction of a vector, returning the result as a scalar. The return typematches the element-type of the vector input.

If the intrinsic call has the nnan fast-math flag then the operation canassume that NaNs are not present in the input vector.

Arguments:

The argument to this intrinsic must be a vector of floating-point values.

‘llvm.experimental.vector.reduce.fmin.*’ Intrinsic

Syntax:
declare float @llvm.experimental.vector.reduce.fmin.v4f32(<4 x float> %a)
declare double @llvm.experimental.vector.reduce.fmin.v2f64(<2 x double> %a)
Overview:

The ‘llvm.experimental.vector.reduce.fmin.*’ intrinsics do a floating-pointMIN reduction of a vector, returning the result as a scalar. The return typematches the element-type of the vector input.

If the intrinsic call has the nnan fast-math flag then the operation canassume that NaNs are not present in the input vector.

Arguments:

The argument to this intrinsic must be a vector of floating-point values.

Matrix Intrinsics

Operations on matrixes requiring shape information (like number of rows/columnsor the memory layout) can be expressed using the matrix intrinsics. Matrixes areembedded in a flat vector and the intrinsics take the dimensions as arguments.Currently column-major layout is assumed. The intrinsics support both integerand floating point matrixes.

‘llvm.matrix.transpose.*’ Intrinsic

Syntax:
declare vectorty @llvm.matrix.transpose.*(vectorty %In, i32 <Rows>, i32 <Cols>)
Overview:

The ‘llvm.matrix.transpose.*’ intrinsic treats %In as containing a matrixwith <Rows> rows and <Cols> columns and returns the transposed matrix embedded inthe result vector.

Arguments:

The <Rows> and <Cols> arguments must be constant integers. The vector argument%In and the returned vector must have <Rows> * <Cols> elements.

‘llvm.matrix.multiply.*’ Intrinsic

Syntax:
declare vectorty @llvm.matrix.multiply.*(vectorty %A, vectorty %B, i32 <M>, i32 <N>, i32 <K>)
Overview:

The ‘llvm.matrix.multiply.*’ intrinsic treats %A as matrix with <M> rows and <K> columns, %B asmatrix with <K> rows and <N> columns and multiplies them. The result matrix is returned embedded in theresult vector.

Arguments:

The <M>, <N> and <K> arguments must be constant integers. The vector argument %Amust have <M> <K> elements, %B must have <K> <N> elements and the returnedvector must have <M> * <N> elements.

‘llvm.matrix.columnwise.load.*’ Intrinsic

Syntax:
declare vectorty @llvm.matrix.columnwise.load.*(ptrty %Ptr, i32 %Stride, i32 <Rows>, i32 <Cols>)
Overview:

The ‘llvm.matrix.columnwise.load.*’ intrinsic loads a matrix with <Rows>rows and <Cols> columns, using a stride of %Stride between columns. For twoconsecutive columns A and B, %Stride refers to the distance (the number ofelements) between the start of column A and the start of column B. The resultmatrix is returned embedded in the result vector. This allows for convenientloading of sub matrixes.

Arguments:

The <Rows> and <Cols> arguments must be constant integers. The returned vectormust have <Rows> * <Cols> elements. %Stride must be >= <Rows>.

‘llvm.matrix.columnwise.store.*’ Intrinsic

Syntax:
declare void @llvm.matrix.columnwise.store.*(vectorty %In, ptrty %Ptr, i32 %Stride, i32 <Rows>, i32 <Cols>)
Overview:

The ‘llvm.matrix.columnwise.store.*’ intrinsic stores the matrix with<Rows> rows and <Cols> columns embedded in %In, using a stride of %Stridebetween columns. For two consecutive columns A and B, %Stride refers to thedistance (the number of elements) between the start of column A and the startof column B.

Arguments:

The <Rows> and <Cols> arguments must be constant integers. The vector argument%In must have <Rows> * <Cols> elements. %Stride must be >= <Rows>.

Half Precision Floating-Point Intrinsics

For most target platforms, half precision floating-point is astorage-only format. This means that it is a dense encoding (in memory)but does not support computation in the format.

This means that code must first load the half-precision floating-pointvalue as an i16, then convert it to float withllvm.convert.from.fp16. Computation canthen be performed on the float value (including extending to doubleetc). To store the value back to memory, it is first converted to floatif needed, then converted to i16 withllvm.convert.to.fp16, then storing as ani16 value.

‘llvm.convert.to.fp16’ Intrinsic

Syntax:
declare i16 @llvm.convert.to.fp16.f32(float %a)
declare i16 @llvm.convert.to.fp16.f64(double %a)
Overview:

The ‘llvm.convert.to.fp16’ intrinsic function performs a conversion from aconventional floating-point type to half precision floating-point format.

Arguments:

The intrinsic function contains single argument - the value to beconverted.

Semantics:

The ‘llvm.convert.to.fp16’ intrinsic function performs a conversion from aconventional floating-point format to half precision floating-point format. Thereturn value is an i16 which contains the converted number.

Examples:
%res = call i16 @llvm.convert.to.fp16.f32(float %a)
store i16 %res, i16* @x, align 2

‘llvm.convert.from.fp16’ Intrinsic

Syntax:
declare float @llvm.convert.from.fp16.f32(i16 %a)
declare double @llvm.convert.from.fp16.f64(i16 %a)
Overview:

The ‘llvm.convert.from.fp16’ intrinsic function performs aconversion from half precision floating-point format to single precisionfloating-point format.

Arguments:

The intrinsic function contains single argument - the value to beconverted.

Semantics:

The ‘llvm.convert.from.fp16’ intrinsic function performs aconversion from half single precision floating-point format to singleprecision floating-point format. The input half-float value isrepresented by an i16 value.

Examples:
%a = load i16, i16* @x, align 2
%res = call float @llvm.convert.from.fp16(i16 %a)

Debugger Intrinsics

The LLVM debugger intrinsics (which all start with llvm.dbg.prefix), are described in the LLVM Source LevelDebuggingdocument.

Exception Handling Intrinsics

The LLVM exception handling intrinsics (which all start withllvm.eh. prefix), are described in the LLVM ExceptionHandling document.

Trampoline Intrinsics

These intrinsics make it possible to excise one parameter, marked withthe nest attribute, from a function. The result is acallable function pointer lacking the nest parameter - the caller doesnot need to provide a value for it. Instead, the value to use is storedin advance in a “trampoline”, a block of memory usually allocated on thestack, which also contains code to splice the nest value into theargument list. This is used to implement the GCC nested function addressextension.

For example, if the function is i32 f(i8 nest %c, i32 %x, i32 %y)then the resulting function pointer has signature i32 (i32, i32).It can be created as follows:

%tramp = alloca [10 x i8], align 4 ; size and alignment only correct for X86
%tramp1 = getelementptr [10 x i8], [10 x i8]* %tramp, i32 0, i32 0
call i8* @llvm.init.trampoline(i8* %tramp1, i8* bitcast (i32 (i8*, i32, i32)* @f to i8*), i8* %nval)
%p = call i8* @llvm.adjust.trampoline(i8* %tramp1)
%fp = bitcast i8* %p to i32 (i32, i32)*

The call %val = call i32 %fp(i32 %x, i32 %y) is then equivalent to%val = call i32 %f(i8* %nval, i32 %x, i32 %y).

‘llvm.init.trampoline’ Intrinsic

Syntax:
declare void @llvm.init.trampoline(i8* <tramp>, i8* <func>, i8* <nval>)
Overview:

This fills the memory pointed to by tramp with executable code,turning it into a trampoline.

Arguments:

The llvm.init.trampoline intrinsic takes three arguments, allpointers. The tramp argument must point to a sufficiently large andsufficiently aligned block of memory; this memory is written to by theintrinsic. Note that the size and the alignment are target-specific -LLVM currently provides no portable way of determining them, so afront-end that generates this intrinsic needs to have sometarget-specific knowledge. The func argument must hold a functionbitcast to an i8*.

Semantics:

The block of memory pointed to by tramp is filled with targetdependent code, turning it into a function. Then tramp needs to bepassed to llvm.adjust.trampoline to get a pointer which canbe bitcast (to a new function) and called. The newfunction’s signature is the same as that of func with any argumentsmarked with the nest attribute removed. At most one such nestargument is allowed, and it must be of pointer type. Calling the newfunction is equivalent to calling func with the same argument list,but with nval used for the missing nest argument. If, aftercalling llvm.init.trampoline, the memory pointed to by tramp ismodified, then the effect of any later call to the returned functionpointer is undefined.

‘llvm.adjust.trampoline’ Intrinsic

Syntax:
declare i8* @llvm.adjust.trampoline(i8* <tramp>)
Overview:

This performs any required machine-specific adjustment to the address ofa trampoline (passed as tramp).

Arguments:

tramp must point to a block of memory which already has trampolinecode filled in by a previous call tollvm.init.trampoline.

Semantics:

On some architectures the address of the code to be executed needs to bedifferent than the address where the trampoline is actually stored. Thisintrinsic returns the executable address corresponding to trampafter performing the required machine specific adjustments. The pointerreturned can then be bitcast and executed.

Vector Predication Intrinsics

VP intrinsics are intended for predicated SIMD/vector code. A typical VPoperation takes a vector mask and an explicit vector length parameter as in:

<W x T> llvm.vp.<opcode>.*(<W x T> %x, <W x T> %y, <W x i1> %mask, i32 %evl)

The vector mask parameter (%mask) always has a vector of i1 type, for example<32 x i1>. The explicit vector length parameter always has the type i32 andis an unsigned integer value. The explicit vector length parameter (%evl) is inthe range:

0 <= %evl <= W,  where W is the number of vector elements

Note that for scalable vector types W is the runtimelength of the vector.

The VP intrinsic has undefined behavior if %evl > W. The explicit vectorlength (%evl) creates a mask, %EVLmask, with all elements 0 <= i < %evl setto True, and all other lanes %evl <= i < W to False. A new mask %M iscalculated with an element-wise AND from %mask and %EVLmask:

M = %mask AND %EVLmask

A vector operation <opcode> on vectors A and B calculates:

A <opcode> B =  {  A[i] <opcode> B[i]   M[i] = True, and
                {  undef otherwise

Optimization Hint

Some targets, such as AVX512, do not support the %evl parameter in hardware.The use of an effective %evl is discouraged for those targets. The functionTargetTransformInfo::hasActiveVectorLength() returns true when the targethas native support for %evl.

‘llvm.vp.add.*’ Intrinsics

Syntax:

This is an overloaded intrinsic.

declare <16 x i32>  @llvm.vp.add.v16i32 (<16 x i32> <left_op>, <16 x i32> <right_op>, <16 x i1> <mask>, i32 <vector_length>)
declare <vscale x 4 x i32>  @llvm.vp.add.nxv4i32 (<vscale x 4 x i32> <left_op>, <vscale x 4 x i32> <right_op>, <vscale x 4 x i1> <mask>, i32 <vector_length>)
declare <256 x i64>  @llvm.vp.add.v256i64 (<256 x i64> <left_op>, <256 x i64> <right_op>, <256 x i1> <mask>, i32 <vector_length>)
Overview:

Predicated integer addition of two vectors of integers.

Arguments:

The first two operands and the result have the same vector of integer type. Thethird operand is the vector mask and has the same number of elements as theresult vector type. The fourth operand is the explicit vector length of theoperation.

Semantics:

The ‘llvm.vp.add’ intrinsic performs integer addition (add)of the first and second vector operand on each enabled lane. The result ondisabled lanes is undefined.

Examples:
%r = call <4 x i32> @llvm.vp.add.v4i32(<4 x i32> %a, <4 x i32> %b, <4 x i1> %mask, i32 %evl)
;; For all lanes below %evl, %r is lane-wise equivalent to %also.r

%t = add <4 x i32> %a, %b
%also.r = select <4 x i1> %mask, <4 x i32> %t, <4 x i32> undef

‘llvm.vp.sub.*’ Intrinsics

Syntax:

This is an overloaded intrinsic.

declare <16 x i32>  @llvm.vp.sub.v16i32 (<16 x i32> <left_op>, <16 x i32> <right_op>, <16 x i1> <mask>, i32 <vector_length>)
declare <vscale x 4 x i32>  @llvm.vp.sub.nxv4i32 (<vscale x 4 x i32> <left_op>, <vscale x 4 x i32> <right_op>, <vscale x 4 x i1> <mask>, i32 <vector_length>)
declare <256 x i64>  @llvm.vp.sub.v256i64 (<256 x i64> <left_op>, <256 x i64> <right_op>, <256 x i1> <mask>, i32 <vector_length>)
Overview:

Predicated integer subtraction of two vectors of integers.

Arguments:

The first two operands and the result have the same vector of integer type. Thethird operand is the vector mask and has the same number of elements as theresult vector type. The fourth operand is the explicit vector length of theoperation.

Semantics:

The ‘llvm.vp.sub’ intrinsic performs integer subtraction(sub) of the first and second vector operand on each enabledlane. The result on disabled lanes is undefined.

Examples:
%r = call <4 x i32> @llvm.vp.sub.v4i32(<4 x i32> %a, <4 x i32> %b, <4 x i1> %mask, i32 %evl)
;; For all lanes below %evl, %r is lane-wise equivalent to %also.r

%t = sub <4 x i32> %a, %b
%also.r = select <4 x i1> %mask, <4 x i32> %t, <4 x i32> undef

‘llvm.vp.mul.*’ Intrinsics

Syntax:

This is an overloaded intrinsic.

declare <16 x i32>  @llvm.vp.mul.v16i32 (<16 x i32> <left_op>, <16 x i32> <right_op>, <16 x i1> <mask>, i32 <vector_length>)
declare <vscale x 4 x i32>  @llvm.vp.mul.nxv46i32 (<vscale x 4 x i32> <left_op>, <vscale x 4 x i32> <right_op>, <vscale x 4 x i1> <mask>, i32 <vector_length>)
declare <256 x i64>  @llvm.vp.mul.v256i64 (<256 x i64> <left_op>, <256 x i64> <right_op>, <256 x i1> <mask>, i32 <vector_length>)
Overview:

Predicated integer multiplication of two vectors of integers.

Arguments:

The first two operands and the result have the same vector of integer type. Thethird operand is the vector mask and has the same number of elements as theresult vector type. The fourth operand is the explicit vector length of theoperation.

Semantics:

The ‘llvm.vp.mul’ intrinsic performs integer multiplication(mul) of the first and second vector operand on each enabledlane. The result on disabled lanes is undefined.

Examples:
%r = call <4 x i32> @llvm.vp.mul.v4i32(<4 x i32> %a, <4 x i32> %b, <4 x i1> %mask, i32 %evl)
;; For all lanes below %evl, %r is lane-wise equivalent to %also.r

%t = mul <4 x i32> %a, %b
%also.r = select <4 x i1> %mask, <4 x i32> %t, <4 x i32> undef

‘llvm.vp.sdiv.*’ Intrinsics

Syntax:

This is an overloaded intrinsic.

declare <16 x i32>  @llvm.vp.sdiv.v16i32 (<16 x i32> <left_op>, <16 x i32> <right_op>, <16 x i1> <mask>, i32 <vector_length>)
declare <vscale x 4 x i32>  @llvm.vp.sdiv.nxv4i32 (<vscale x 4 x i32> <left_op>, <vscale x 4 x i32> <right_op>, <vscale x 4 x i1> <mask>, i32 <vector_length>)
declare <256 x i64>  @llvm.vp.sdiv.v256i64 (<256 x i64> <left_op>, <256 x i64> <right_op>, <256 x i1> <mask>, i32 <vector_length>)
Overview:

Predicated, signed division of two vectors of integers.

Arguments:

The first two operands and the result have the same vector of integer type. Thethird operand is the vector mask and has the same number of elements as theresult vector type. The fourth operand is the explicit vector length of theoperation.

Semantics:

The ‘llvm.vp.sdiv’ intrinsic performs signed division (sdiv)of the first and second vector operand on each enabled lane. The result ondisabled lanes is undefined.

Examples:
%r = call <4 x i32> @llvm.vp.sdiv.v4i32(<4 x i32> %a, <4 x i32> %b, <4 x i1> %mask, i32 %evl)
;; For all lanes below %evl, %r is lane-wise equivalent to %also.r

%t = sdiv <4 x i32> %a, %b
%also.r = select <4 x ii> %mask, <4 x i32> %t, <4 x i32> undef

‘llvm.vp.udiv.*’ Intrinsics

Syntax:

This is an overloaded intrinsic.

declare <16 x i32>  @llvm.vp.udiv.v16i32 (<16 x i32> <left_op>, <16 x i32> <right_op>, <16 x i1> <mask>, i32 <vector_length>)
declare <vscale x 4 x i32>  @llvm.vp.udiv.nxv4i32 (<vscale x 4 x i32> <left_op>, <vscale x 4 x i32> <right_op>, <vscale x 4 x i1> <mask>, i32 <vector_length>)
declare <256 x i64>  @llvm.vp.udiv.v256i64 (<256 x i64> <left_op>, <256 x i64> <right_op>, <256 x i1> <mask>, i32 <vector_length>)
Overview:

Predicated, unsigned division of two vectors of integers.

Arguments:

The first two operands and the result have the same vector of integer type. The third operand is the vector mask and has the same number of elements as the result vector type. The fourth operand is the explicit vector length of the operation.

Semantics:

The ‘llvm.vp.udiv’ intrinsic performs unsigned division(udiv) of the first and second vector operand on each enabledlane. The result on disabled lanes is undefined.

Examples:
%r = call <4 x i32> @llvm.vp.udiv.v4i32(<4 x i32> %a, <4 x i32> %b, <4 x i1> %mask, i32 %evl)
;; For all lanes below %evl, %r is lane-wise equivalent to %also.r

%t = udiv <4 x i32> %a, %b
%also.r = select <4 x ii> %mask, <4 x i32> %t, <4 x i32> undef

‘llvm.vp.srem.*’ Intrinsics

Syntax:

This is an overloaded intrinsic.

declare <16 x i32>  @llvm.vp.srem.v16i32 (<16 x i32> <left_op>, <16 x i32> <right_op>, <16 x i1> <mask>, i32 <vector_length>)
declare <vscale x 4 x i32>  @llvm.vp.srem.nxv4i32 (<vscale x 4 x i32> <left_op>, <vscale x 4 x i32> <right_op>, <vscale x 4 x i1> <mask>, i32 <vector_length>)
declare <256 x i64>  @llvm.vp.srem.v256i64 (<256 x i64> <left_op>, <256 x i64> <right_op>, <256 x i1> <mask>, i32 <vector_length>)
Overview:

Predicated computations of the signed remainder of two integer vectors.

Arguments:

The first two operands and the result have the same vector of integer type. Thethird operand is the vector mask and has the same number of elements as theresult vector type. The fourth operand is the explicit vector length of theoperation.

Semantics:

The ‘llvm.vp.srem’ intrinsic computes the remainder of the signed division(srem) of the first and second vector operand on each enabledlane. The result on disabled lanes is undefined.

Examples:
%r = call <4 x i32> @llvm.vp.srem.v4i32(<4 x i32> %a, <4 x i32> %b, <4 x i1> %mask, i32 %evl)
;; For all lanes below %evl, %r is lane-wise equivalent to %also.r

%t = srem <4 x i32> %a, %b
%also.r = select <4 x i1> %mask, <4 x i32> %t, <4 x i32> undef

‘llvm.vp.urem.*’ Intrinsics

Syntax:

This is an overloaded intrinsic.

declare <16 x i32>  @llvm.vp.urem.v16i32 (<16 x i32> <left_op>, <16 x i32> <right_op>, <16 x i1> <mask>, i32 <vector_length>)
declare <vscale x 4 x i32>  @llvm.vp.urem.nxv4i32 (<vscale x 4 x i32> <left_op>, <vscale x 4 x i32> <right_op>, <vscale x 4 x i1> <mask>, i32 <vector_length>)
declare <256 x i64>  @llvm.vp.urem.v256i64 (<256 x i64> <left_op>, <256 x i64> <right_op>, <256 x i1> <mask>, i32 <vector_length>)
Overview:

Predicated computation of the unsigned remainder of two integer vectors.

Arguments:

The first two operands and the result have the same vector of integer type. Thethird operand is the vector mask and has the same number of elements as theresult vector type. The fourth operand is the explicit vector length of theoperation.

Semantics:

The ‘llvm.vp.urem’ intrinsic computes the remainder of the unsigned division(urem) of the first and second vector operand on each enabledlane. The result on disabled lanes is undefined.

Examples:
%r = call <4 x i32> @llvm.vp.urem.v4i32(<4 x i32> %a, <4 x i32> %b, <4 x i1> %mask, i32 %evl)
;; For all lanes below %evl, %r is lane-wise equivalent to %also.r

%t = urem <4 x i32> %a, %b
%also.r = select <4 x i1> %mask, <4 x i32> %t, <4 x i32> undef

‘llvm.vp.ashr.*’ Intrinsics

Syntax:

This is an overloaded intrinsic.

declare <16 x i32>  @llvm.vp.ashr.v16i32 (<16 x i32> <left_op>, <16 x i32> <right_op>, <16 x i1> <mask>, i32 <vector_length>)
declare <vscale x 4 x i32>  @llvm.vp.ashr.nxv4i32 (<vscale x 4 x i32> <left_op>, <vscale x 4 x i32> <right_op>, <vscale x 4 x i1> <mask>, i32 <vector_length>)
declare <256 x i64>  @llvm.vp.ashr.v256i64 (<256 x i64> <left_op>, <256 x i64> <right_op>, <256 x i1> <mask>, i32 <vector_length>)
Overview:

Vector-predicated arithmetic right-shift.

Arguments:

The first two operands and the result have the same vector of integer type. Thethird operand is the vector mask and has the same number of elements as theresult vector type. The fourth operand is the explicit vector length of theoperation.

Semantics:

The ‘llvm.vp.ashr’ intrinsic computes the arithmetic right shift(ashr) of the first operand by the second operand on eachenabled lane. The result on disabled lanes is undefined.

Examples:
%r = call <4 x i32> @llvm.vp.ashr.v4i32(<4 x i32> %a, <4 x i32> %b, <4 x i1> %mask, i32 %evl)
;; For all lanes below %evl, %r is lane-wise equivalent to %also.r

%t = ashr <4 x i32> %a, %b
%also.r = select <4 x i1> %mask, <4 x i32> %t, <4 x i32> undef

‘llvm.vp.lshr.*’ Intrinsics

Syntax:

This is an overloaded intrinsic.

declare <16 x i32>  @llvm.vp.lshr.v16i32 (<16 x i32> <left_op>, <16 x i32> <right_op>, <16 x i1> <mask>, i32 <vector_length>)
declare <vscale x 4 x i32>  @llvm.vp.lshr.nxv4i32 (<vscale x 4 x i32> <left_op>, <vscale x 4 x i32> <right_op>, <vscale x 4 x i1> <mask>, i32 <vector_length>)
declare <256 x i64>  @llvm.vp.lshr.v256i64 (<256 x i64> <left_op>, <256 x i64> <right_op>, <256 x i1> <mask>, i32 <vector_length>)
Overview:

Vector-predicated logical right-shift.

Arguments:

The first two operands and the result have the same vector of integer type. Thethird operand is the vector mask and has the same number of elements as theresult vector type. The fourth operand is the explicit vector length of theoperation.

Semantics:

The ‘llvm.vp.lshr’ intrinsic computes the logical right shift(lshr) of the first operand by the second operand on eachenabled lane. The result on disabled lanes is undefined.

Examples:
%r = call <4 x i32> @llvm.vp.lshr.v4i32(<4 x i32> %a, <4 x i32> %b, <4 x i1> %mask, i32 %evl)
;; For all lanes below %evl, %r is lane-wise equivalent to %also.r

%t = lshr <4 x i32> %a, %b
%also.r = select <4 x i1> %mask, <4 x i32> %t, <4 x i32> undef

‘llvm.vp.shl.*’ Intrinsics

Syntax:

This is an overloaded intrinsic.

declare <16 x i32>  @llvm.vp.shl.v16i32 (<16 x i32> <left_op>, <16 x i32> <right_op>, <16 x i1> <mask>, i32 <vector_length>)
declare <vscale x 4 x i32>  @llvm.vp.shl.nxv4i32 (<vscale x 4 x i32> <left_op>, <vscale x 4 x i32> <right_op>, <vscale x 4 x i1> <mask>, i32 <vector_length>)
declare <256 x i64>  @llvm.vp.shl.v256i64 (<256 x i64> <left_op>, <256 x i64> <right_op>, <256 x i1> <mask>, i32 <vector_length>)
Overview:

Vector-predicated left shift.

Arguments:

The first two operands and the result have the same vector of integer type. Thethird operand is the vector mask and has the same number of elements as theresult vector type. The fourth operand is the explicit vector length of theoperation.

Semantics:

The ‘llvm.vp.shl’ intrinsic computes the left shift (shl) ofthe first operand by the second operand on each enabled lane. The result ondisabled lanes is undefined.

Examples:
%r = call <4 x i32> @llvm.vp.shl.v4i32(<4 x i32> %a, <4 x i32> %b, <4 x i1> %mask, i32 %evl)
;; For all lanes below %evl, %r is lane-wise equivalent to %also.r

%t = shl <4 x i32> %a, %b
%also.r = select <4 x i1> %mask, <4 x i32> %t, <4 x i32> undef

‘llvm.vp.or.*’ Intrinsics

Syntax:

This is an overloaded intrinsic.

declare <16 x i32>  @llvm.vp.or.v16i32 (<16 x i32> <left_op>, <16 x i32> <right_op>, <16 x i1> <mask>, i32 <vector_length>)
declare <vscale x 4 x i32>  @llvm.vp.or.nxv4i32 (<vscale x 4 x i32> <left_op>, <vscale x 4 x i32> <right_op>, <vscale x 4 x i1> <mask>, i32 <vector_length>)
declare <256 x i64>  @llvm.vp.or.v256i64 (<256 x i64> <left_op>, <256 x i64> <right_op>, <256 x i1> <mask>, i32 <vector_length>)
Overview:

Vector-predicated or.

Arguments:

The first two operands and the result have the same vector of integer type. Thethird operand is the vector mask and has the same number of elements as theresult vector type. The fourth operand is the explicit vector length of theoperation.

Semantics:

The ‘llvm.vp.or’ intrinsic performs a bitwise or (or) of thefirst two operands on each enabled lane. The result on disabled lanes isundefined.

Examples:
%r = call <4 x i32> @llvm.vp.or.v4i32(<4 x i32> %a, <4 x i32> %b, <4 x i1> %mask, i32 %evl)
;; For all lanes below %evl, %r is lane-wise equivalent to %also.r

%t = or <4 x i32> %a, %b
%also.r = select <4 x i1> %mask, <4 x i32> %t, <4 x i32> undef

‘llvm.vp.and.*’ Intrinsics

Syntax:

This is an overloaded intrinsic.

declare <16 x i32>  @llvm.vp.and.v16i32 (<16 x i32> <left_op>, <16 x i32> <right_op>, <16 x i1> <mask>, i32 <vector_length>)
declare <vscale x 4 x i32>  @llvm.vp.and.nxv4i32 (<vscale x 4 x i32> <left_op>, <vscale x 4 x i32> <right_op>, <vscale x 4 x i1> <mask>, i32 <vector_length>)
declare <256 x i64>  @llvm.vp.and.v256i64 (<256 x i64> <left_op>, <256 x i64> <right_op>, <256 x i1> <mask>, i32 <vector_length>)
Overview:

Vector-predicated and.

Arguments:

The first two operands and the result have the same vector of integer type. Thethird operand is the vector mask and has the same number of elements as theresult vector type. The fourth operand is the explicit vector length of theoperation.

Semantics:

The ‘llvm.vp.and’ intrinsic performs a bitwise and (and) ofthe first two operands on each enabled lane. The result on disabled lanes isundefined.

Examples:
%r = call <4 x i32> @llvm.vp.and.v4i32(<4 x i32> %a, <4 x i32> %b, <4 x i1> %mask, i32 %evl)
;; For all lanes below %evl, %r is lane-wise equivalent to %also.r

%t = and <4 x i32> %a, %b
%also.r = select <4 x i1> %mask, <4 x i32> %t, <4 x i32> undef

‘llvm.vp.xor.*’ Intrinsics

Syntax:

This is an overloaded intrinsic.

declare <16 x i32>  @llvm.vp.xor.v16i32 (<16 x i32> <left_op>, <16 x i32> <right_op>, <16 x i1> <mask>, i32 <vector_length>)
declare <vscale x 4 x i32>  @llvm.vp.xor.nxv4i32 (<vscale x 4 x i32> <left_op>, <vscale x 4 x i32> <right_op>, <vscale x 4 x i1> <mask>, i32 <vector_length>)
declare <256 x i64>  @llvm.vp.xor.v256i64 (<256 x i64> <left_op>, <256 x i64> <right_op>, <256 x i1> <mask>, i32 <vector_length>)
Overview:

Vector-predicated, bitwise xor.

Arguments:

The first two operands and the result have the same vector of integer type. Thethird operand is the vector mask and has the same number of elements as theresult vector type. The fourth operand is the explicit vector length of theoperation.

Semantics:

The ‘llvm.vp.xor’ intrinsic performs a bitwise xor (xor) ofthe first two operands on each enabled lane.The result on disabled lanes is undefined.

Examples:
%r = call <4 x i32> @llvm.vp.xor.v4i32(<4 x i32> %a, <4 x i32> %b, <4 x i1> %mask, i32 %evl)
;; For all lanes below %evl, %r is lane-wise equivalent to %also.r

%t = xor <4 x i32> %a, %b
%also.r = select <4 x i1> %mask, <4 x i32> %t, <4 x i32> undef

Masked Vector Load and Store Intrinsics

LLVM provides intrinsics for predicated vector load and store operations. The predicate is specified by a mask operand, which holds one bit per vector element, switching the associated vector lane on or off. The memory addresses corresponding to the “off” lanes are not accessed. When all bits of the mask are on, the intrinsic is identical to a regular vector load or store. When all bits are off, no memory is accessed.

‘llvm.masked.load.*’ Intrinsics

Syntax:

This is an overloaded intrinsic. The loaded data is a vector of any integer, floating-point or pointer data type.

declare <16 x float>  @llvm.masked.load.v16f32.p0v16f32 (<16 x float>* <ptr>, i32 <alignment>, <16 x i1> <mask>, <16 x float> <passthru>)
declare <2 x double>  @llvm.masked.load.v2f64.p0v2f64  (<2 x double>* <ptr>, i32 <alignment>, <2 x i1>  <mask>, <2 x double> <passthru>)
;; The data is a vector of pointers to double
declare <8 x double*> @llvm.masked.load.v8p0f64.p0v8p0f64    (<8 x double*>* <ptr>, i32 <alignment>, <8 x i1> <mask>, <8 x double*> <passthru>)
;; The data is a vector of function pointers
declare <8 x i32 ()*> @llvm.masked.load.v8p0f_i32f.p0v8p0f_i32f (<8 x i32 ()*>* <ptr>, i32 <alignment>, <8 x i1> <mask>, <8 x i32 ()*> <passthru>)
Overview:

Reads a vector from memory according to the provided mask. The mask holds a bit for each vector lane, and is used to prevent memory accesses to the masked-off lanes. The masked-off lanes in the result vector are taken from the corresponding lanes of the ‘passthru’ operand.

Arguments:

The first operand is the base pointer for the load. The second operand is the alignment of the source location. It must be a power of two constant integer value. The third operand, mask, is a vector of boolean values with the same number of elements as the return type. The fourth is a pass-through value that is used to fill the masked-off lanes of the result. The return type, underlying type of the base pointer and the type of the ‘passthru’ operand are the same vector types.

Semantics:

The ‘llvm.masked.load’ intrinsic is designed for conditional reading of selected vector elements in a single IR operation. It is useful for targets that support vector masked loads and allows vectorizing predicated basic blocks on these targets. Other targets may support this intrinsic differently, for example by lowering it into a sequence of branches that guard scalar load operations.The result of this operation is equivalent to a regular vector load instruction followed by a ‘select’ between the loaded and the passthru values, predicated on the same mask. However, using this intrinsic prevents exceptions on memory access to masked-off lanes.

%res = call <16 x float> @llvm.masked.load.v16f32.p0v16f32 (<16 x float>* %ptr, i32 4, <16 x i1>%mask, <16 x float> %passthru)

;; The result of the two following instructions is identical aside from potential memory access exception
%loadlal = load <16 x float>, <16 x float>* %ptr, align 4
%res = select <16 x i1> %mask, <16 x float> %loadlal, <16 x float> %passthru

‘llvm.masked.store.*’ Intrinsics

Syntax:

This is an overloaded intrinsic. The data stored in memory is a vector of any integer, floating-point or pointer data type.

declare void @llvm.masked.store.v8i32.p0v8i32  (<8  x i32>   <value>, <8  x i32>*   <ptr>, i32 <alignment>,  <8  x i1> <mask>)
declare void @llvm.masked.store.v16f32.p0v16f32 (<16 x float> <value>, <16 x float>* <ptr>, i32 <alignment>,  <16 x i1> <mask>)
;; The data is a vector of pointers to double
declare void @llvm.masked.store.v8p0f64.p0v8p0f64    (<8 x double*> <value>, <8 x double*>* <ptr>, i32 <alignment>, <8 x i1> <mask>)
;; The data is a vector of function pointers
declare void @llvm.masked.store.v4p0f_i32f.p0v4p0f_i32f (<4 x i32 ()*> <value>, <4 x i32 ()*>* <ptr>, i32 <alignment>, <4 x i1> <mask>)
Overview:

Writes a vector to memory according to the provided mask. The mask holds a bit for each vector lane, and is used to prevent memory accesses to the masked-off lanes.

Arguments:

The first operand is the vector value to be written to memory. The second operand is the base pointer for the store, it has the same underlying type as the value operand. The third operand is the alignment of the destination location. It must be a power of two constant integer value. The fourth operand, mask, is a vector of boolean values. The types of the mask and the value operand must have the same number of vector elements.

Semantics:

The ‘llvm.masked.store’ intrinsics is designed for conditional writing of selected vector elements in a single IR operation. It is useful for targets that support vector masked store and allows vectorizing predicated basic blocks on these targets. Other targets may support this intrinsic differently, for example by lowering it into a sequence of branches that guard scalar store operations.The result of this operation is equivalent to a load-modify-store sequence. However, using this intrinsic prevents exceptions and data races on memory access to masked-off lanes.

call void @llvm.masked.store.v16f32.p0v16f32(<16 x float> %value, <16 x float>* %ptr, i32 4,  <16 x i1> %mask)

;; The result of the following instructions is identical aside from potential data races and memory access exceptions
%oldval = load <16 x float>, <16 x float>* %ptr, align 4
%res = select <16 x i1> %mask, <16 x float> %value, <16 x float> %oldval
store <16 x float> %res, <16 x float>* %ptr, align 4

Masked Vector Gather and Scatter Intrinsics

LLVM provides intrinsics for vector gather and scatter operations. They are similar to Masked Vector Load and Store, except they are designed for arbitrary memory accesses, rather than sequential memory accesses. Gather and scatter also employ a mask operand, which holds one bit per vector element, switching the associated vector lane on or off. The memory addresses corresponding to the “off” lanes are not accessed. When all bits are off, no memory is accessed.

‘llvm.masked.gather.*’ Intrinsics

Syntax:

This is an overloaded intrinsic. The loaded data are multiple scalar values of any integer, floating-point or pointer data type gathered together into one vector.

declare <16 x float> @llvm.masked.gather.v16f32.v16p0f32   (<16 x float*> <ptrs>, i32 <alignment>, <16 x i1> <mask>, <16 x float> <passthru>)
declare <2 x double> @llvm.masked.gather.v2f64.v2p1f64     (<2 x double addrspace(1)*> <ptrs>, i32 <alignment>, <2 x i1>  <mask>, <2 x double> <passthru>)
declare <8 x float*> @llvm.masked.gather.v8p0f32.v8p0p0f32 (<8 x float**> <ptrs>, i32 <alignment>, <8 x i1>  <mask>, <8 x float*> <passthru>)
Overview:

Reads scalar values from arbitrary memory locations and gathers them into one vector. The memory locations are provided in the vector of pointers ‘ptrs’. The memory is accessed according to the provided mask. The mask holds a bit for each vector lane, and is used to prevent memory accesses to the masked-off lanes. The masked-off lanes in the result vector are taken from the corresponding lanes of the ‘passthru’ operand.

Arguments:

The first operand is a vector of pointers which holds all memory addresses to read. The second operand is an alignment of the source addresses. It must be 0 or a power of two constant integer value. The third operand, mask, is a vector of boolean values with the same number of elements as the return type. The fourth is a pass-through value that is used to fill the masked-off lanes of the result. The return type, underlying type of the vector of pointers and the type of the ‘passthru’ operand are the same vector types.

Semantics:

The ‘llvm.masked.gather’ intrinsic is designed for conditional reading of multiple scalar values from arbitrary memory locations in a single IR operation. It is useful for targets that support vector masked gathers and allows vectorizing basic blocks with data and control divergence. Other targets may support this intrinsic differently, for example by lowering it into a sequence of scalar load operations.The semantics of this operation are equivalent to a sequence of conditional scalar loads with subsequent gathering all loaded values into a single vector. The mask restricts memory access to certain lanes and facilitates vectorization of predicated basic blocks.

%res = call <4 x double> @llvm.masked.gather.v4f64.v4p0f64 (<4 x double*> %ptrs, i32 8, <4 x i1> <i1 true, i1 true, i1 true, i1 true>, <4 x double> undef)

;; The gather with all-true mask is equivalent to the following instruction sequence
%ptr0 = extractelement <4 x double*> %ptrs, i32 0
%ptr1 = extractelement <4 x double*> %ptrs, i32 1
%ptr2 = extractelement <4 x double*> %ptrs, i32 2
%ptr3 = extractelement <4 x double*> %ptrs, i32 3

%val0 = load double, double* %ptr0, align 8
%val1 = load double, double* %ptr1, align 8
%val2 = load double, double* %ptr2, align 8
%val3 = load double, double* %ptr3, align 8

%vec0    = insertelement <4 x double>undef, %val0, 0
%vec01   = insertelement <4 x double>%vec0, %val1, 1
%vec012  = insertelement <4 x double>%vec01, %val2, 2
%vec0123 = insertelement <4 x double>%vec012, %val3, 3

‘llvm.masked.scatter.*’ Intrinsics

Syntax:

This is an overloaded intrinsic. The data stored in memory is a vector of any integer, floating-point or pointer data type. Each vector element is stored in an arbitrary memory address. Scatter with overlapping addresses is guaranteed to be ordered from least-significant to most-significant element.

declare void @llvm.masked.scatter.v8i32.v8p0i32     (<8 x i32>     <value>, <8 x i32*>     <ptrs>, i32 <alignment>, <8 x i1>  <mask>)
declare void @llvm.masked.scatter.v16f32.v16p1f32   (<16 x float>  <value>, <16 x float addrspace(1)*>  <ptrs>, i32 <alignment>, <16 x i1> <mask>)
declare void @llvm.masked.scatter.v4p0f64.v4p0p0f64 (<4 x double*> <value>, <4 x double**> <ptrs>, i32 <alignment>, <4 x i1>  <mask>)
Overview:

Writes each element from the value vector to the corresponding memory address. The memory addresses are represented as a vector of pointers. Writing is done according to the provided mask. The mask holds a bit for each vector lane, and is used to prevent memory accesses to the masked-off lanes.

Arguments:

The first operand is a vector value to be written to memory. The second operand is a vector of pointers, pointing to where the value elements should be stored. It has the same underlying type as the value operand. The third operand is an alignment of the destination addresses. It must be 0 or a power of two constant integer value. The fourth operand, mask, is a vector of boolean values. The types of the mask and the value operand must have the same number of vector elements.

Semantics:

The ‘llvm.masked.scatter’ intrinsics is designed for writing selected vector elements to arbitrary memory addresses in a single IR operation. The operation may be conditional, when not all bits in the mask are switched on. It is useful for targets that support vector masked scatter and allows vectorizing basic blocks with data and control divergence. Other targets may support this intrinsic differently, for example by lowering it into a sequence of branches that guard scalar store operations.

;; This instruction unconditionally stores data vector in multiple addresses
call @llvm.masked.scatter.v8i32.v8p0i32 (<8 x i32> %value, <8 x i32*> %ptrs, i32 4,  <8 x i1>  <true, true, .. true>)

;; It is equivalent to a list of scalar stores
%val0 = extractelement <8 x i32> %value, i32 0
%val1 = extractelement <8 x i32> %value, i32 1
..
%val7 = extractelement <8 x i32> %value, i32 7
%ptr0 = extractelement <8 x i32*> %ptrs, i32 0
%ptr1 = extractelement <8 x i32*> %ptrs, i32 1
..
%ptr7 = extractelement <8 x i32*> %ptrs, i32 7
;; Note: the order of the following stores is important when they overlap:
store i32 %val0, i32* %ptr0, align 4
store i32 %val1, i32* %ptr1, align 4
..
store i32 %val7, i32* %ptr7, align 4

Masked Vector Expanding Load and Compressing Store Intrinsics

LLVM provides intrinsics for expanding load and compressing store operations. Data selected from a vector according to a mask is stored in consecutive memory addresses (compressed store), and vice-versa (expanding load). These operations effective map to “if (cond.i) a[j++] = v.i” and “if (cond.i) v.i = a[j++]” patterns, respectively. Note that when the mask starts with ‘1’ bits followed by ‘0’ bits, these operations are identical to llvm.masked.store and llvm.masked.load.

‘llvm.masked.expandload.*’ Intrinsics

Syntax:

This is an overloaded intrinsic. Several values of integer, floating point or pointer data type are loaded from consecutive memory addresses and stored into the elements of a vector according to the mask.

declare <16 x float>  @llvm.masked.expandload.v16f32 (float* <ptr>, <16 x i1> <mask>, <16 x float> <passthru>)
declare <2 x i64>     @llvm.masked.expandload.v2i64 (i64* <ptr>, <2 x i1>  <mask>, <2 x i64> <passthru>)
Overview:

Reads a number of scalar values sequentially from memory location provided in ‘ptr’ and spreads them in a vector. The ‘mask’ holds a bit for each vector lane. The number of elements read from memory is equal to the number of ‘1’ bits in the mask. The loaded elements are positioned in the destination vector according to the sequence of ‘1’ and ‘0’ bits in the mask. E.g., if the mask vector is ‘10010001’, “expandload” reads 3 values from memory addresses ptr, ptr+1, ptr+2 and places them in lanes 0, 3 and 7 accordingly. The masked-off lanes are filled by elements from the corresponding lanes of the ‘passthru’ operand.

Arguments:

The first operand is the base pointer for the load. It has the same underlying type as the element of the returned vector. The second operand, mask, is a vector of boolean values with the same number of elements as the return type. The third is a pass-through value that is used to fill the masked-off lanes of the result. The return type and the type of the ‘passthru’ operand have the same vector type.

Semantics:

The ‘llvm.masked.expandload’ intrinsic is designed for reading multiple scalar values from adjacent memory addresses into possibly non-adjacent vector lanes. It is useful for targets that support vector expanding loads and allows vectorizing loop with cross-iteration dependency like in the following example:

// In this loop we load from B and spread the elements into array A.
double *A, B; int *C;
for (int i = 0; i < size; ++i) {
  if (C[i] != 0)
    A[i] = B[j++];
}
; Load several elements from array B and expand them in a vector.
; The number of loaded elements is equal to the number of '1' elements in the Mask.
%Tmp = call <8 x double> @llvm.masked.expandload.v8f64(double* %Bptr, <8 x i1> %Mask, <8 x double> undef)
; Store the result in A
call void @llvm.masked.store.v8f64.p0v8f64(<8 x double> %Tmp, <8 x double>* %Aptr, i32 8, <8 x i1> %Mask)

; %Bptr should be increased on each iteration according to the number of '1' elements in the Mask.
%MaskI = bitcast <8 x i1> %Mask to i8
%MaskIPopcnt = call i8 @llvm.ctpop.i8(i8 %MaskI)
%MaskI64 = zext i8 %MaskIPopcnt to i64
%BNextInd = add i64 %BInd, %MaskI64

Other targets may support this intrinsic differently, for example, by lowering it into a sequence of conditional scalar load operations and shuffles.If all mask elements are ‘1’, the intrinsic behavior is equivalent to the regular unmasked vector load.

‘llvm.masked.compressstore.*’ Intrinsics

Syntax:

This is an overloaded intrinsic. A number of scalar values of integer, floating point or pointer data type are collected from an input vector and stored into adjacent memory addresses. A mask defines which elements to collect from the vector.

declare void @llvm.masked.compressstore.v8i32  (<8  x i32>   <value>, i32*   <ptr>, <8  x i1> <mask>)
declare void @llvm.masked.compressstore.v16f32 (<16 x float> <value>, float* <ptr>, <16 x i1> <mask>)
Overview:

Selects elements from input vector ‘value’ according to the ‘mask’. All selected elements are written into adjacent memory addresses starting at address ‘ptr’, from lower to higher. The mask holds a bit for each vector lane, and is used to select elements to be stored. The number of elements to be stored is equal to the number of active bits in the mask.

Arguments:

The first operand is the input vector, from which elements are collected and written to memory. The second operand is the base pointer for the store, it has the same underlying type as the element of the input vector operand. The third operand is the mask, a vector of boolean values. The mask and the input vector must have the same number of vector elements.

Semantics:

The ‘llvm.masked.compressstore’ intrinsic is designed for compressing data in memory. It allows to collect elements from possibly non-adjacent lanes of a vector and store them contiguously in memory in one IR operation. It is useful for targets that support compressing store operations and allows vectorizing loops with cross-iteration dependences like in the following example:

// In this loop we load elements from A and store them consecutively in B
double *A, B; int *C;
for (int i = 0; i < size; ++i) {
  if (C[i] != 0)
    B[j++] = A[i]
}
; Load elements from A.
%Tmp = call <8 x double> @llvm.masked.load.v8f64.p0v8f64(<8 x double>* %Aptr, i32 8, <8 x i1> %Mask, <8 x double> undef)
; Store all selected elements consecutively in array B
call <void> @llvm.masked.compressstore.v8f64(<8 x double> %Tmp, double* %Bptr, <8 x i1> %Mask)

; %Bptr should be increased on each iteration according to the number of '1' elements in the Mask.
%MaskI = bitcast <8 x i1> %Mask to i8
%MaskIPopcnt = call i8 @llvm.ctpop.i8(i8 %MaskI)
%MaskI64 = zext i8 %MaskIPopcnt to i64
%BNextInd = add i64 %BInd, %MaskI64

Other targets may support this intrinsic differently, for example, by lowering it into a sequence of branches that guard scalar store operations.

Memory Use Markers

This class of intrinsics provides information about the lifetime ofmemory objects and ranges where variables are immutable.

‘llvm.lifetime.start’ Intrinsic

Syntax:
declare void @llvm.lifetime.start(i64 <size>, i8* nocapture <ptr>)
Overview:

The ‘llvm.lifetime.start’ intrinsic specifies the start of a memoryobject’s lifetime.

Arguments:

The first argument is a constant integer representing the size of theobject, or -1 if it is variable sized. The second argument is a pointerto the object.

Semantics:

This intrinsic indicates that before this point in the code, the valueof the memory pointed to by ptr is dead. This means that it is knownto never be used and has an undefined value. A load from the pointerthat precedes this intrinsic can be replaced with 'undef'.

‘llvm.lifetime.end’ Intrinsic

Syntax:
declare void @llvm.lifetime.end(i64 <size>, i8* nocapture <ptr>)
Overview:

The ‘llvm.lifetime.end’ intrinsic specifies the end of a memoryobject’s lifetime.

Arguments:

The first argument is a constant integer representing the size of theobject, or -1 if it is variable sized. The second argument is a pointerto the object.

Semantics:

This intrinsic indicates that after this point in the code, the value ofthe memory pointed to by ptr is dead. This means that it is known tonever be used and has an undefined value. Any stores into the memoryobject following this intrinsic may be removed as dead.

‘llvm.invariant.start’ Intrinsic

Syntax:

This is an overloaded intrinsic. The memory object can belong to any address space.

declare {}* @llvm.invariant.start.p0i8(i64 <size>, i8* nocapture <ptr>)
Overview:

The ‘llvm.invariant.start’ intrinsic specifies that the contents ofa memory object will not change.

Arguments:

The first argument is a constant integer representing the size of theobject, or -1 if it is variable sized. The second argument is a pointerto the object.

Semantics:

This intrinsic indicates that until an llvm.invariant.end that usesthe return value, the referenced memory location is constant andunchanging.

‘llvm.invariant.end’ Intrinsic

Syntax:

This is an overloaded intrinsic. The memory object can belong to any address space.

declare void @llvm.invariant.end.p0i8({}* <start>, i64 <size>, i8* nocapture <ptr>)
Overview:

The ‘llvm.invariant.end’ intrinsic specifies that the contents of amemory object are mutable.

Arguments:

The first argument is the matching llvm.invariant.start intrinsic.The second argument is a constant integer representing the size of theobject, or -1 if it is variable sized and the third argument is apointer to the object.

Semantics:

This intrinsic indicates that the memory is mutable again.

‘llvm.launder.invariant.group’ Intrinsic

Syntax:

This is an overloaded intrinsic. The memory object can belong to any addressspace. The returned pointer must belong to the same address space as theargument.

declare i8* @llvm.launder.invariant.group.p0i8(i8* <ptr>)
Overview:

The ‘llvm.launder.invariant.group’ intrinsic can be used when an invariantestablished by invariant.group metadata no longer holds, to obtain a newpointer value that carries fresh invariant group information. It is anexperimental intrinsic, which means that its semantics might change in thefuture.

Arguments:

The llvm.launder.invariant.group takes only one argument, which is a pointerto the memory.

Semantics:

Returns another pointer that aliases its argument but which is considered differentfor the purposes of load/store invariant.group metadata.It does not read any accessible memory and the execution can be speculated.

‘llvm.strip.invariant.group’ Intrinsic

Syntax:

This is an overloaded intrinsic. The memory object can belong to any addressspace. The returned pointer must belong to the same address space as theargument.

declare i8* @llvm.strip.invariant.group.p0i8(i8* <ptr>)
Overview:

The ‘llvm.strip.invariant.group’ intrinsic can be used when an invariantestablished by invariant.group metadata no longer holds, to obtain a new pointervalue that does not carry the invariant information. It is an experimentalintrinsic, which means that its semantics might change in the future.

Arguments:

The llvm.strip.invariant.group takes only one argument, which is a pointerto the memory.

Semantics:

Returns another pointer that aliases its argument but which has no associatedinvariant.group metadata.It does not read any memory and can be speculated.

Constrained Floating-Point Intrinsics

These intrinsics are used to provide special handling of floating-pointoperations when specific rounding mode or floating-point exception behavior isrequired. By default, LLVM optimization passes assume that the rounding mode isround-to-nearest and that floating-point exceptions will not be monitored.Constrained FP intrinsics are used to support non-default rounding modes andaccurately preserve exception behavior without compromising LLVM’s ability tooptimize FP code when the default behavior is used.

If any FP operation in a function is constrained then they all must beconstrained. This is required for correct LLVM IR. Optimizations thatmove code around can create miscompiles if mixing of constrained and normaloperations is done. The correct way to mix constrained and less constrainedoperations is to use the rounding mode and exception handling metadata tomark constrained intrinsics as having LLVM’s default behavior.

Each of these intrinsics corresponds to a normal floating-point operation. Thedata arguments and the return value are the same as the corresponding FPoperation.

The rounding mode argument is a metadata string specifying whatassumptions, if any, the optimizer can make when transforming constantvalues. Some constrained FP intrinsics omit this argument. If requiredby the intrinsic, this argument must be one of the following strings:

"round.dynamic"
"round.tonearest"
"round.downward"
"round.upward"
"round.towardzero"

If this argument is “round.dynamic” optimization passes must assume that therounding mode is unknown and may change at runtime. No transformations thatdepend on rounding mode may be performed in this case.

The other possible values for the rounding mode argument correspond to thesimilarly named IEEE rounding modes. If the argument is any of these valuesoptimization passes may perform transformations as long as they are consistentwith the specified rounding mode.

For example, ‘x-0’->’x’ is not a valid transformation if the rounding mode is“round.downward” or “round.dynamic” because if the value of ‘x’ is +0 then‘x-0’ should evaluate to ‘-0’ when rounding downward. However, thistransformation is legal for all other rounding modes.

For values other than “round.dynamic” optimization passes may assume that theactual runtime rounding mode (as defined in a target-specific manner) matchesthe specified rounding mode, but this is not guaranteed. Using a specificnon-dynamic rounding mode which does not match the actual rounding mode atruntime results in undefined behavior.

The exception behavior argument is a metadata string describing the floatingpoint exception semantics that required for the intrinsic. This argumentmust be one of the following strings:

"fpexcept.ignore"
"fpexcept.maytrap"
"fpexcept.strict"

If this argument is “fpexcept.ignore” optimization passes may assume that theexception status flags will not be read and that floating-point exceptions willbe masked. This allows transformations to be performed that may change theexception semantics of the original code. For example, FP operations may bespeculatively executed in this case whereas they must not be for either of theother possible values of this argument.

If the exception behavior argument is “fpexcept.maytrap” optimization passesmust avoid transformations that may raise exceptions that would not have beenraised by the original code (such as speculatively executing FP operations), butpasses are not required to preserve all exceptions that are implied by theoriginal code. For example, exceptions may be potentially hidden by constantfolding.

If the exception behavior argument is “fpexcept.strict” all transformations muststrictly preserve the floating-point exception semantics of the original code.Any FP exception that would have been raised by the original code must be raisedby the transformed code, and the transformed code must not raise any FPexceptions that would not have been raised by the original code. This is theexception behavior argument that will be used if the code being compiled readsthe FP exception status flags, but this mode can also be used with code thatunmasks FP exceptions.

The number and order of floating-point exceptions is NOT guaranteed. Forexample, a series of FP operations that each may raise exceptions may bevectorized into a single instruction that raises each unique exception a singletime.

Proper function attributes usage is required for theconstrained intrinsics to function correctly.

All function calls done in a function that uses constrained floatingpoint intrinsics must have the strictfp attribute.

All function definitions that use constrained floating point intrinsicsmust have the strictfp attribute.

‘llvm.experimental.constrained.fadd’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.fadd(<type> <op1>, <type> <op2>,
                                    metadata <rounding mode>,
                                    metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.fadd’ intrinsic returns the sum of itstwo operands.

Arguments:

The first two arguments to the ‘llvm.experimental.constrained.fadd’intrinsic must be floating-point or vectorof floating-point values. Both arguments must have identical types.

The third and fourth arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

The value produced is the floating-point sum of the two value operands and hasthe same type as the operands.

‘llvm.experimental.constrained.fsub’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.fsub(<type> <op1>, <type> <op2>,
                                    metadata <rounding mode>,
                                    metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.fsub’ intrinsic returns the differenceof its two operands.

Arguments:

The first two arguments to the ‘llvm.experimental.constrained.fsub’intrinsic must be floating-point or vectorof floating-point values. Both arguments must have identical types.

The third and fourth arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

The value produced is the floating-point difference of the two value operandsand has the same type as the operands.

‘llvm.experimental.constrained.fmul’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.fmul(<type> <op1>, <type> <op2>,
                                    metadata <rounding mode>,
                                    metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.fmul’ intrinsic returns the product ofits two operands.

Arguments:

The first two arguments to the ‘llvm.experimental.constrained.fmul’intrinsic must be floating-point or vectorof floating-point values. Both arguments must have identical types.

The third and fourth arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

The value produced is the floating-point product of the two value operands andhas the same type as the operands.

‘llvm.experimental.constrained.fdiv’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.fdiv(<type> <op1>, <type> <op2>,
                                    metadata <rounding mode>,
                                    metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.fdiv’ intrinsic returns the quotient ofits two operands.

Arguments:

The first two arguments to the ‘llvm.experimental.constrained.fdiv’intrinsic must be floating-point or vectorof floating-point values. Both arguments must have identical types.

The third and fourth arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

The value produced is the floating-point quotient of the two value operands andhas the same type as the operands.

‘llvm.experimental.constrained.frem’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.frem(<type> <op1>, <type> <op2>,
                                    metadata <rounding mode>,
                                    metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.frem’ intrinsic returns the remainderfrom the division of its two operands.

Arguments:

The first two arguments to the ‘llvm.experimental.constrained.frem’intrinsic must be floating-point or vectorof floating-point values. Both arguments must have identical types.

The third and fourth arguments specify the rounding mode and exceptionbehavior as described above. The rounding mode argument has no effect, sincethe result of frem is never rounded, but the argument is included forconsistency with the other constrained floating-point intrinsics.

Semantics:

The value produced is the floating-point remainder from the division of the twovalue operands and has the same type as the operands. The remainder has thesame sign as the dividend.

‘llvm.experimental.constrained.fma’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.fma(<type> <op1>, <type> <op2>, <type> <op3>,
                                    metadata <rounding mode>,
                                    metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.fma’ intrinsic returns the result of afused-multiply-add operation on its operands.

Arguments:

The first three arguments to the ‘llvm.experimental.constrained.fma’intrinsic must be floating-point or vector of floating-point values. All arguments must have identical types.

The fourth and fifth arguments specify the rounding mode and exception behavioras described above.

Semantics:

The result produced is the product of the first two operands added to the thirdoperand computed with infinite precision, and then rounded to the targetprecision.

‘llvm.experimental.constrained.fptoui’ Intrinsic

Syntax:
declare <ty2>
@llvm.experimental.constrained.fptoui(<type> <value>,
                                    metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.fptoui’ intrinsic converts afloating-point value to its unsigned integer equivalent of type ty2.

Arguments:

The first argument to the ‘llvm.experimental.constrained.fptoui’intrinsic must be floating point or vector of floating point values.

The second argument specifies the exception behavior as described above.

Semantics:

The result produced is an unsigned integer converted from the floatingpoint operand. The value is truncated, so it is rounded towards zero.

‘llvm.experimental.constrained.fptosi’ Intrinsic

Syntax:
declare <ty2>
@llvm.experimental.constrained.fptosi(<type> <value>,
                                    metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.fptosi’ intrinsic convertsfloating-point value to type ty2.

Arguments:

The first argument to the ‘llvm.experimental.constrained.fptosi’intrinsic must be floating point or vector of floating point values.

The second argument specifies the exception behavior as described above.

Semantics:

The result produced is a signed integer converted from the floatingpoint operand. The value is truncated, so it is rounded towards zero.

‘llvm.experimental.constrained.uitofp’ Intrinsic

Syntax:
declare <ty2>
@llvm.experimental.constrained.uitofp(<type> <value>,
                                    metadata <rounding mode>,
                                    metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.uitofp’ intrinsic converts anunsigned integer value to a floating-point of type ty2.

Arguments:

The first argument to the ‘llvm.experimental.constrained.uitofp’intrinsic must be an integer or vector of integer values.

The second and third arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

An inexact floating-point exception will be raised if rounding is required.Any result produced is a floating point value converted from the inputinteger operand.

‘llvm.experimental.constrained.sitofp’ Intrinsic

Syntax:
declare <ty2>
@llvm.experimental.constrained.sitofp(<type> <value>,
                                    metadata <rounding mode>,
                                    metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.sitofp’ intrinsic converts asigned integer value to a floating-point of type ty2.

Arguments:

The first argument to the ‘llvm.experimental.constrained.sitofp’intrinsic must be an integer or vector of integer values.

The second and third arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

An inexact floating-point exception will be raised if rounding is required.Any result produced is a floating point value converted from the inputinteger operand.

‘llvm.experimental.constrained.fptrunc’ Intrinsic

Syntax:
declare <ty2>
@llvm.experimental.constrained.fptrunc(<type> <value>,
                                    metadata <rounding mode>,
                                    metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.fptrunc’ intrinsic truncates valueto type ty2.

Arguments:

The first argument to the ‘llvm.experimental.constrained.fptrunc’intrinsic must be floating point or vector of floating point values. This argument must be larger in sizethan the result.

The second and third arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

The result produced is a floating point value truncated to be smaller in sizethan the operand.

‘llvm.experimental.constrained.fpext’ Intrinsic

Syntax:
declare <ty2>
@llvm.experimental.constrained.fpext(<type> <value>,
                                    metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.fpext’ intrinsic extends afloating-point value to a larger floating-point value.

Arguments:

The first argument to the ‘llvm.experimental.constrained.fpext’intrinsic must be floating point or vector of floating point values. This argument must be smaller in sizethan the result.

The second argument specifies the exception behavior as described above.

Semantics:

The result produced is a floating point value extended to be larger in sizethan the operand. All restrictions that apply to the fpext instruction alsoapply to this intrinsic.

‘llvm.experimental.constrained.fcmp’ and ‘llvm.experimental.constrained.fcmps’ Intrinsics

Syntax:
declare <ty2>
@llvm.experimental.constrained.fcmp(<type> <op1>, <type> <op2>,
                                    metadata <condition code>,
                                    metadata <exception behavior>)
declare <ty2>
@llvm.experimental.constrained.fcmps(<type> <op1>, <type> <op2>,
                                     metadata <condition code>,
                                     metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.fcmp’ and‘llvm.experimental.constrained.fcmps’ intrinsics return a booleanvalue or vector of boolean values based on comparison of its operands.

If the operands are floating-point scalars, then the result type is aboolean (i1).

If the operands are floating-point vectors, then the result type is avector of boolean with the same number of elements as the operands beingcompared.

The ‘llvm.experimental.constrained.fcmp’ intrinsic performs a quietcomparison operation while the ‘llvm.experimental.constrained.fcmps’intrinsic performs a signaling comparison operation.

Arguments:

The first two arguments to the ‘llvm.experimental.constrained.fcmp’and ‘llvm.experimental.constrained.fcmps’ intrinsics must befloating-point or vectorof floating-point values. Both arguments must have identical types.

The third argument is the condition code indicating the kind of comparisonto perform. It must be a metadata string with one of the following values:

  • oeq”: ordered and equal
  • ogt”: ordered and greater than
  • oge”: ordered and greater than or equal
  • olt”: ordered and less than
  • ole”: ordered and less than or equal
  • one”: ordered and not equal
  • ord”: ordered (no nans)
  • ueq”: unordered or equal
  • ugt”: unordered or greater than
  • uge”: unordered or greater than or equal
  • ult”: unordered or less than
  • ule”: unordered or less than or equal
  • une”: unordered or not equal
  • uno”: unordered (either nans)

Ordered means that neither operand is a NAN while unordered meansthat either operand may be a NAN.

The fourth argument specifies the exception behavior as described above.

Semantics:

op1 and op2 are compared according to the condition code givenas the third argument. If the operands are vectors, then thevectors are compared element by element. Each comparison performedalways yields an i1 result, as follows:

  • oeq”: yields true if both operands are not a NAN and op1is equal to op2.
  • ogt”: yields true if both operands are not a NAN and op1is greater than op2.
  • oge”: yields true if both operands are not a NAN and op1is greater than or equal to op2.
  • olt”: yields true if both operands are not a NAN and op1is less than op2.
  • ole”: yields true if both operands are not a NAN and op1is less than or equal to op2.
  • one”: yields true if both operands are not a NAN and op1is not equal to op2.
  • ord”: yields true if both operands are not a NAN.
  • ueq”: yields true if either operand is a NAN or op1 isequal to op2.
  • ugt”: yields true if either operand is a NAN or op1 isgreater than op2.
  • uge”: yields true if either operand is a NAN or op1 isgreater than or equal to op2.
  • ult”: yields true if either operand is a NAN or op1 isless than op2.
  • ule”: yields true if either operand is a NAN or op1 isless than or equal to op2.
  • une”: yields true if either operand is a NAN or op1 isnot equal to op2.
  • uno”: yields true if either operand is a NAN.

The quiet comparison operation performed by‘llvm.experimental.constrained.fcmp’ will only raise an exceptionif either operand is a SNAN. The signaling comparison operationperformed by ‘llvm.experimental.constrained.fcmps’ will raise anexception if either operand is a NAN (QNAN or SNAN).

‘llvm.experimental.constrained.fmuladd’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.fmuladd(<type> <op1>, <type> <op2>,
                                       <type> <op3>,
                                       metadata <rounding mode>,
                                       metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.fmuladd’ intrinsic representsmultiply-add expressions that can be fused if the code generator determinesthat (a) the target instruction set has support for a fused operation,and (b) that the fused operation is more efficient than the equivalent,separate pair of mul and add instructions.

Arguments:

The first three arguments to the ‘llvm.experimental.constrained.fmuladd’intrinsic must be floating-point or vector of floating-point values.All three arguments must have identical types.

The fourth and fifth arguments specifiy the rounding mode and exception behavioras described above.

Semantics:

The expression:

%0 = call float @llvm.experimental.constrained.fmuladd.f32(%a, %b, %c,
                                                           metadata <rounding mode>,
                                                           metadata <exception behavior>)

is equivalent to the expression:

%0 = call float @llvm.experimental.constrained.fmul.f32(%a, %b,
                                                        metadata <rounding mode>,
                                                        metadata <exception behavior>)
%1 = call float @llvm.experimental.constrained.fadd.f32(%0, %c,
                                                        metadata <rounding mode>,
                                                        metadata <exception behavior>)

except that it is unspecified whether rounding will be performed between themultiplication and addition steps. Fusion is not guaranteed, even if the targetplatform supports it.If a fused multiply-add is required, the correspondingllvm.experimental.constrained.fma intrinsic function should beused instead.This never sets errno, just as ‘llvm.experimental.constrained.fma.*’.

Constrained libm-equivalent Intrinsics

In addition to the basic floating-point operations for which constrainedintrinsics are described above, there are constrained versions of variousoperations which provide equivalent behavior to a corresponding libm function.These intrinsics allow the precise behavior of these operations with respect torounding mode and exception behavior to be controlled.

As with the basic constrained floating-point intrinsics, the rounding modeand exception behavior arguments only control the behavior of the optimizer.They do not change the runtime floating-point environment.

‘llvm.experimental.constrained.sqrt’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.sqrt(<type> <op1>,
                                    metadata <rounding mode>,
                                    metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.sqrt’ intrinsic returns the square rootof the specified value, returning the same value as the libm ‘sqrt’functions would, but without setting errno.

Arguments:

The first argument and the return type are floating-point numbers of the sametype.

The second and third arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

This function returns the nonnegative square root of the specified value.If the value is less than negative zero, a floating-point exception occursand the return value is architecture specific.

‘llvm.experimental.constrained.pow’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.pow(<type> <op1>, <type> <op2>,
                                   metadata <rounding mode>,
                                   metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.pow’ intrinsic returns the first operandraised to the (positive or negative) power specified by the second operand.

Arguments:

The first two arguments and the return value are floating-point numbers of thesame type. The second argument specifies the power to which the first argumentshould be raised.

The third and fourth arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

This function returns the first value raised to the second power,returning the same values as the libm pow functions would, andhandles error conditions in the same way.

‘llvm.experimental.constrained.powi’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.powi(<type> <op1>, i32 <op2>,
                                    metadata <rounding mode>,
                                    metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.powi’ intrinsic returns the first operandraised to the (positive or negative) power specified by the second operand. Theorder of evaluation of multiplications is not defined. When a vector offloating-point type is used, the second argument remains a scalar integer value.

Arguments:

The first argument and the return value are floating-point numbers of the sametype. The second argument is a 32-bit signed integer specifying the power towhich the first argument should be raised.

The third and fourth arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

This function returns the first value raised to the second power with anunspecified sequence of rounding operations.

‘llvm.experimental.constrained.sin’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.sin(<type> <op1>,
                                   metadata <rounding mode>,
                                   metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.sin’ intrinsic returns the sine of thefirst operand.

Arguments:

The first argument and the return type are floating-point numbers of the sametype.

The second and third arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

This function returns the sine of the specified operand, returning thesame values as the libm sin functions would, and handles errorconditions in the same way.

‘llvm.experimental.constrained.cos’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.cos(<type> <op1>,
                                   metadata <rounding mode>,
                                   metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.cos’ intrinsic returns the cosine of thefirst operand.

Arguments:

The first argument and the return type are floating-point numbers of the sametype.

The second and third arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

This function returns the cosine of the specified operand, returning thesame values as the libm cos functions would, and handles errorconditions in the same way.

‘llvm.experimental.constrained.exp’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.exp(<type> <op1>,
                                   metadata <rounding mode>,
                                   metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.exp’ intrinsic computes the base-eexponential of the specified value.

Arguments:

The first argument and the return value are floating-point numbers of the sametype.

The second and third arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

This function returns the same values as the libm exp functionswould, and handles error conditions in the same way.

‘llvm.experimental.constrained.exp2’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.exp2(<type> <op1>,
                                    metadata <rounding mode>,
                                    metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.exp2’ intrinsic computes the base-2exponential of the specified value.

Arguments:

The first argument and the return value are floating-point numbers of the sametype.

The second and third arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

This function returns the same values as the libm exp2 functionswould, and handles error conditions in the same way.

‘llvm.experimental.constrained.log’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.log(<type> <op1>,
                                   metadata <rounding mode>,
                                   metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.log’ intrinsic computes the base-elogarithm of the specified value.

Arguments:

The first argument and the return value are floating-point numbers of the sametype.

The second and third arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

This function returns the same values as the libm log functionswould, and handles error conditions in the same way.

‘llvm.experimental.constrained.log10’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.log10(<type> <op1>,
                                     metadata <rounding mode>,
                                     metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.log10’ intrinsic computes the base-10logarithm of the specified value.

Arguments:

The first argument and the return value are floating-point numbers of the sametype.

The second and third arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

This function returns the same values as the libm log10 functionswould, and handles error conditions in the same way.

‘llvm.experimental.constrained.log2’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.log2(<type> <op1>,
                                    metadata <rounding mode>,
                                    metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.log2’ intrinsic computes the base-2logarithm of the specified value.

Arguments:

The first argument and the return value are floating-point numbers of the sametype.

The second and third arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

This function returns the same values as the libm log2 functionswould, and handles error conditions in the same way.

‘llvm.experimental.constrained.rint’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.rint(<type> <op1>,
                                    metadata <rounding mode>,
                                    metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.rint’ intrinsic returns the firstoperand rounded to the nearest integer. It may raise an inexact floating-pointexception if the operand is not an integer.

Arguments:

The first argument and the return value are floating-point numbers of the sametype.

The second and third arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

This function returns the same values as the libm rint functionswould, and handles error conditions in the same way. The rounding mode isdescribed, not determined, by the rounding mode argument. The actual roundingmode is determined by the runtime floating-point environment. The roundingmode argument is only intended as information to the compiler.

‘llvm.experimental.constrained.lrint’ Intrinsic

Syntax:
declare <inttype>
@llvm.experimental.constrained.lrint(<fptype> <op1>,
                                     metadata <rounding mode>,
                                     metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.lrint’ intrinsic returns the firstoperand rounded to the nearest integer. An inexact floating-point exceptionwill be raised if the operand is not an integer. An invalid exception israised if the result is too large to fit into a supported integer type,and in this case the result is undefined.

Arguments:

The first argument is a floating-point number. The return value is aninteger type. Not all types are supported on all targets. The supportedtypes are the same as the llvm.lrint intrinsic and the lrintlibm functions.

The second and third arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

This function returns the same values as the libm lrint functionswould, and handles error conditions in the same way.

The rounding mode is described, not determined, by the rounding modeargument. The actual rounding mode is determined by the runtime floating-pointenvironment. The rounding mode argument is only intended as informationto the compiler.

If the runtime floating-point environment is using the default rounding modethen the results will be the same as the llvm.lrint intrinsic.

‘llvm.experimental.constrained.llrint’ Intrinsic

Syntax:
declare <inttype>
@llvm.experimental.constrained.llrint(<fptype> <op1>,
                                      metadata <rounding mode>,
                                      metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.llrint’ intrinsic returns the firstoperand rounded to the nearest integer. An inexact floating-point exceptionwill be raised if the operand is not an integer. An invalid exception israised if the result is too large to fit into a supported integer type,and in this case the result is undefined.

Arguments:

The first argument is a floating-point number. The return value is aninteger type. Not all types are supported on all targets. The supportedtypes are the same as the llvm.llrint intrinsic and the llrintlibm functions.

The second and third arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

This function returns the same values as the libm llrint functionswould, and handles error conditions in the same way.

The rounding mode is described, not determined, by the rounding modeargument. The actual rounding mode is determined by the runtime floating-pointenvironment. The rounding mode argument is only intended as informationto the compiler.

If the runtime floating-point environment is using the default rounding modethen the results will be the same as the llvm.llrint intrinsic.

‘llvm.experimental.constrained.nearbyint’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.nearbyint(<type> <op1>,
                                         metadata <rounding mode>,
                                         metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.nearbyint’ intrinsic returns the firstoperand rounded to the nearest integer. It will not raise an inexactfloating-point exception if the operand is not an integer.

Arguments:

The first argument and the return value are floating-point numbers of the sametype.

The second and third arguments specify the rounding mode and exceptionbehavior as described above.

Semantics:

This function returns the same values as the libm nearbyint functionswould, and handles error conditions in the same way. The rounding mode isdescribed, not determined, by the rounding mode argument. The actual roundingmode is determined by the runtime floating-point environment. The roundingmode argument is only intended as information to the compiler.

‘llvm.experimental.constrained.maxnum’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.maxnum(<type> <op1>, <type> <op2>
                                      metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.maxnum’ intrinsic returns the maximumof the two arguments.

Arguments:

The first two arguments and the return value are floating-point numbersof the same type.

The third argument specifies the exception behavior as described above.

Semantics:

This function follows the IEEE-754 semantics for maxNum.

‘llvm.experimental.constrained.minnum’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.minnum(<type> <op1>, <type> <op2>
                                      metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.minnum’ intrinsic returns the minimumof the two arguments.

Arguments:

The first two arguments and the return value are floating-point numbersof the same type.

The third argument specifies the exception behavior as described above.

Semantics:

This function follows the IEEE-754 semantics for minNum.

‘llvm.experimental.constrained.maximum’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.maximum(<type> <op1>, <type> <op2>
                                       metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.maximum’ intrinsic returns the maximumof the two arguments, propagating NaNs and treating -0.0 as less than +0.0.

Arguments:

The first two arguments and the return value are floating-point numbersof the same type.

The third argument specifies the exception behavior as described above.

Semantics:

This function follows semantics specified in the draft of IEEE 754-2018.

‘llvm.experimental.constrained.minimum’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.minimum(<type> <op1>, <type> <op2>
                                       metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.minimum’ intrinsic returns the minimumof the two arguments, propagating NaNs and treating -0.0 as less than +0.0.

Arguments:

The first two arguments and the return value are floating-point numbersof the same type.

The third argument specifies the exception behavior as described above.

Semantics:

This function follows semantics specified in the draft of IEEE 754-2018.

‘llvm.experimental.constrained.ceil’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.ceil(<type> <op1>,
                                    metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.ceil’ intrinsic returns the ceiling of thefirst operand.

Arguments:

The first argument and the return value are floating-point numbers of the sametype.

The second argument specifies the exception behavior as described above.

Semantics:

This function returns the same values as the libm ceil functionswould and handles error conditions in the same way.

‘llvm.experimental.constrained.floor’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.floor(<type> <op1>,
                                     metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.floor’ intrinsic returns the floor of thefirst operand.

Arguments:

The first argument and the return value are floating-point numbers of the sametype.

The second argument specifies the exception behavior as described above.

Semantics:

This function returns the same values as the libm floor functionswould and handles error conditions in the same way.

‘llvm.experimental.constrained.round’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.round(<type> <op1>,
                                     metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.round’ intrinsic returns the firstoperand rounded to the nearest integer.

Arguments:

The first argument and the return value are floating-point numbers of the sametype.

The second argument specifies the exception behavior as described above.

Semantics:

This function returns the same values as the libm round functionswould and handles error conditions in the same way.

‘llvm.experimental.constrained.lround’ Intrinsic

Syntax:
declare <inttype>
@llvm.experimental.constrained.lround(<fptype> <op1>,
                                      metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.lround’ intrinsic returns the firstoperand rounded to the nearest integer with ties away from zero. It willraise an inexact floating-point exception if the operand is not an integer.An invalid exception is raised if the result is too large to fit into asupported integer type, and in this case the result is undefined.

Arguments:

The first argument is a floating-point number. The return value is aninteger type. Not all types are supported on all targets. The supportedtypes are the same as the llvm.lround intrinsic and the lroundlibm functions.

The second argument specifies the exception behavior as described above.

Semantics:

This function returns the same values as the libm lround functionswould and handles error conditions in the same way.

‘llvm.experimental.constrained.llround’ Intrinsic

Syntax:
declare <inttype>
@llvm.experimental.constrained.llround(<fptype> <op1>,
                                       metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.llround’ intrinsic returns the firstoperand rounded to the nearest integer with ties away from zero. It willraise an inexact floating-point exception if the operand is not an integer.An invalid exception is raised if the result is too large to fit into asupported integer type, and in this case the result is undefined.

Arguments:

The first argument is a floating-point number. The return value is aninteger type. Not all types are supported on all targets. The supportedtypes are the same as the llvm.llround intrinsic and the llroundlibm functions.

The second argument specifies the exception behavior as described above.

Semantics:

This function returns the same values as the libm llround functionswould and handles error conditions in the same way.

‘llvm.experimental.constrained.trunc’ Intrinsic

Syntax:
declare <type>
@llvm.experimental.constrained.trunc(<type> <op1>,
                                     metadata <exception behavior>)
Overview:

The ‘llvm.experimental.constrained.trunc’ intrinsic returns the firstoperand rounded to the nearest integer not larger in magnitude than theoperand.

Arguments:

The first argument and the return value are floating-point numbers of the sametype.

The second argument specifies the exception behavior as described above.

Semantics:

This function returns the same values as the libm trunc functionswould and handles error conditions in the same way.

General Intrinsics

This class of intrinsics is designed to be generic and has no specificpurpose.

‘llvm.var.annotation’ Intrinsic

Syntax:
declare void @llvm.var.annotation(i8* <val>, i8* <str>, i8* <str>, i32  <int>)
Overview:

The ‘llvm.var.annotation’ intrinsic.

Arguments:

The first argument is a pointer to a value, the second is a pointer to aglobal string, the third is a pointer to a global string which is thesource file name, and the last argument is the line number.

Semantics:

This intrinsic allows annotation of local variables with arbitrarystrings. This can be useful for special purpose optimizations that wantto look for these annotations. These have no other defined use; they areignored by code generation and optimization.

‘llvm.ptr.annotation.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use ‘llvm.ptr.annotation’ on apointer to an integer of any width. NOTE you must specify an address space forthe pointer. The identifier for the default address space is the integer‘0’.

declare i8*   @llvm.ptr.annotation.p<address space>i8(i8* <val>, i8* <str>, i8* <str>, i32  <int>)
declare i16*  @llvm.ptr.annotation.p<address space>i16(i16* <val>, i8* <str>, i8* <str>, i32  <int>)
declare i32*  @llvm.ptr.annotation.p<address space>i32(i32* <val>, i8* <str>, i8* <str>, i32  <int>)
declare i64*  @llvm.ptr.annotation.p<address space>i64(i64* <val>, i8* <str>, i8* <str>, i32  <int>)
declare i256* @llvm.ptr.annotation.p<address space>i256(i256* <val>, i8* <str>, i8* <str>, i32  <int>)
Overview:

The ‘llvm.ptr.annotation’ intrinsic.

Arguments:

The first argument is a pointer to an integer value of arbitrary bitwidth(result of some expression), the second is a pointer to a global string, thethird is a pointer to a global string which is the source file name, and thelast argument is the line number. It returns the value of the first argument.

Semantics:

This intrinsic allows annotation of a pointer to an integer with arbitrarystrings. This can be useful for special purpose optimizations that want to lookfor these annotations. These have no other defined use; they are ignored by codegeneration and optimization.

‘llvm.annotation.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use ‘llvm.annotation’ onany integer bit width.

declare i8 @llvm.annotation.i8(i8 <val>, i8* <str>, i8* <str>, i32  <int>)
declare i16 @llvm.annotation.i16(i16 <val>, i8* <str>, i8* <str>, i32  <int>)
declare i32 @llvm.annotation.i32(i32 <val>, i8* <str>, i8* <str>, i32  <int>)
declare i64 @llvm.annotation.i64(i64 <val>, i8* <str>, i8* <str>, i32  <int>)
declare i256 @llvm.annotation.i256(i256 <val>, i8* <str>, i8* <str>, i32  <int>)
Overview:

The ‘llvm.annotation’ intrinsic.

Arguments:

The first argument is an integer value (result of some expression), thesecond is a pointer to a global string, the third is a pointer to aglobal string which is the source file name, and the last argument isthe line number. It returns the value of the first argument.

Semantics:

This intrinsic allows annotations to be put on arbitrary expressionswith arbitrary strings. This can be useful for special purposeoptimizations that want to look for these annotations. These have noother defined use; they are ignored by code generation and optimization.

‘llvm.codeview.annotation’ Intrinsic

Syntax:

This annotation emits a label at its program point and an associatedS_ANNOTATION codeview record with some additional string metadata. This isused to implement MSVC’s __annotation intrinsic. It is markednoduplicate, so calls to this intrinsic prevent inlining and should beconsidered expensive.

declare void @llvm.codeview.annotation(metadata)
Arguments:

The argument should be an MDTuple containing any number of MDStrings.

‘llvm.trap’ Intrinsic

Syntax:
declare void @llvm.trap() cold noreturn nounwind
Overview:

The ‘llvm.trap’ intrinsic.

Arguments:

None.

Semantics:

This intrinsic is lowered to the target dependent trap instruction. Ifthe target does not have a trap instruction, this intrinsic will belowered to a call of the abort() function.

‘llvm.debugtrap’ Intrinsic

Syntax:
declare void @llvm.debugtrap() nounwind
Overview:

The ‘llvm.debugtrap’ intrinsic.

Arguments:

None.

Semantics:

This intrinsic is lowered to code which is intended to cause anexecution trap with the intention of requesting the attention of adebugger.

‘llvm.stackprotector’ Intrinsic

Syntax:
declare void @llvm.stackprotector(i8* <guard>, i8** <slot>)
Overview:

The llvm.stackprotector intrinsic takes the guard and stores itonto the stack at slot. The stack slot is adjusted to ensure that itis placed on the stack before local variables.

Arguments:

The llvm.stackprotector intrinsic requires two pointer arguments.The first argument is the value loaded from the stack guard@__stack_chk_guard. The second variable is an alloca that hasenough space to hold the value of the guard.

Semantics:

This intrinsic causes the prologue/epilogue inserter to force the position ofthe AllocaInst stack slot to be before local variables on the stack. This isto ensure that if a local variable on the stack is overwritten, it will destroythe value of the guard. When the function exits, the guard on the stack ischecked against the original guard by llvm.stackprotectorcheck. If they aredifferent, then llvm.stackprotectorcheck causes the program to abort bycalling the __stack_chk_fail() function.

‘llvm.stackguard’ Intrinsic

Syntax:
declare i8* @llvm.stackguard()
Overview:

The llvm.stackguard intrinsic returns the system stack guard value.

It should not be generated by frontends, since it is only for internal usage.The reason why we create this intrinsic is that we still support IR form StackProtector in FastISel.

Arguments:

None.

Semantics:

On some platforms, the value returned by this intrinsic remains unchangedbetween loads in the same thread. On other platforms, it returns the sameglobal variable value, if any, e.g. @__stack_chk_guard.

Currently some platforms have IR-level customized stack guard loading (e.g.X86 Linux) that is not handled by llvm.stackguard(), while they should bein the future.

‘llvm.objectsize’ Intrinsic

Syntax:
declare i32 @llvm.objectsize.i32(i8* <object>, i1 <min>, i1 <nullunknown>, i1 <dynamic>)
declare i64 @llvm.objectsize.i64(i8* <object>, i1 <min>, i1 <nullunknown>, i1 <dynamic>)
Overview:

The llvm.objectsize intrinsic is designed to provide information to theoptimizer to determine whether a) an operation (like memcpy) will overflow abuffer that corresponds to an object, or b) that a runtime check for overflowisn’t necessary. An object in this context means an allocation of a specificclass, structure, array, or other object.

Arguments:

The llvm.objectsize intrinsic takes four arguments. The first argument is apointer to or into the object. The second argument determines whetherllvm.objectsize returns 0 (if true) or -1 (if false) when the object size isunknown. The third argument controls how llvm.objectsize acts when nullin address space 0 is used as its pointer argument. If it’s false,llvm.objectsize reports 0 bytes available when given null. Otherwise, ifthe null is in a non-zero address space or if true is given for thethird argument of llvm.objectsize, we assume its size is unknown. The fourthargument to llvm.objectsize determines if the value should be evaluated atruntime.

The second, third, and fourth arguments only accept constants.

Semantics:

The llvm.objectsize intrinsic is lowered to a value representing the size ofthe object concerned. If the size cannot be determined, llvm.objectsizereturns i32/i64 -1 or 0 (depending on the min argument).

‘llvm.expect’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.expect on anyinteger bit width.

declare i1 @llvm.expect.i1(i1 <val>, i1 <expected_val>)
declare i32 @llvm.expect.i32(i32 <val>, i32 <expected_val>)
declare i64 @llvm.expect.i64(i64 <val>, i64 <expected_val>)
Overview:

The llvm.expect intrinsic provides information about expected (themost probable) value of val, which can be used by optimizers.

Arguments:

The llvm.expect intrinsic takes two arguments. The first argument isa value. The second argument is an expected value.

Semantics:

This intrinsic is lowered to the val.

‘llvm.assume’ Intrinsic

Syntax:
declare void @llvm.assume(i1 %cond)
Overview:

The llvm.assume allows the optimizer to assume that the providedcondition is true. This information can then be used in simplifying other partsof the code.

More complex assumptions can be encoded asassume operand bundles.

Arguments:

The argument of the call is the condition which the optimizer may assume isalways true.

Semantics:

The intrinsic allows the optimizer to assume that the provided condition isalways true whenever the control flow reaches the intrinsic call. No code isgenerated for this intrinsic, and instructions that contribute only to theprovided condition are not used for code generation. If the condition isviolated during execution, the behavior is undefined.

Note that the optimizer might limit the transformations performed on valuesused by the llvm.assume intrinsic in order to preserve the instructionsonly used to form the intrinsic’s input argument. This might prove undesirableif the extra information provided by the llvm.assume intrinsic does not causesufficient overall improvement in code quality. For this reason,llvm.assume should not be used to document basic mathematical invariantsthat the optimizer can otherwise deduce or facts that are of little use to theoptimizer.

‘llvm.ssa_copy’ Intrinsic

Syntax:
declare type @llvm.ssa_copy(type %operand) returned(1) readnone
Arguments:

The first argument is an operand which is used as the returned value.

Overview:

The llvm.ssa_copy intrinsic can be used to attach information tooperations by copying them and giving them new names. For example,the PredicateInfo utility uses it to build Extended SSA form, andattach various forms of information to operands that dominate specificuses. It is not meant for general use, only for building temporaryrenaming forms that require value splits at certain points.

‘llvm.type.test’ Intrinsic

Syntax:
declare i1 @llvm.type.test(i8* %ptr, metadata %type) nounwind readnone
Arguments:

The first argument is a pointer to be tested. The second argument is ametadata object representing a type identifier.

Overview:

The llvm.type.test intrinsic tests whether the given pointer is associatedwith the given type identifier.

‘llvm.type.checked.load’ Intrinsic

Syntax:
declare {i8*, i1} @llvm.type.checked.load(i8* %ptr, i32 %offset, metadata %type) argmemonly nounwind readonly
Arguments:

The first argument is a pointer from which to load a function pointer. Thesecond argument is the byte offset from which to load the function pointer. Thethird argument is a metadata object representing a type identifier.

Overview:

The llvm.type.checked.load intrinsic safely loads a function pointer from avirtual table pointer using type metadata. This intrinsic is used to implementcontrol flow integrity in conjunction with virtual call optimization. Thevirtual call optimization pass will optimize away llvm.type.checked.loadintrinsics associated with devirtualized calls, thereby removing the typecheck in cases where it is not needed to enforce the control flow integrityconstraint.

If the given pointer is associated with a type metadata identifier, thisfunction returns true as the second element of its return value. (Note thatthe function may also return true if the given pointer is not associatedwith a type metadata identifier.) If the function’s return value’s secondelement is true, the following rules apply to the first element:

  • If the given pointer is associated with the given type metadata identifier,it is the function pointer loaded from the given byte offset from the givenpointer.
  • If the given pointer is not associated with the given type metadataidentifier, it is one of the following (the choice of which is unspecified):
    • The function pointer that would have been loaded from an arbitrarily chosen(through an unspecified mechanism) pointer associated with the typemetadata.
    • If the function has a non-void return type, a pointer to a function thatreturns an unspecified value without causing side effects.

If the function’s return value’s second element is false, the value of thefirst element is undefined.

‘llvm.donothing’ Intrinsic

Syntax:
declare void @llvm.donothing() nounwind readnone
Overview:

The llvm.donothing intrinsic doesn’t perform any operation. It’s one of onlythree intrinsics (besides llvm.experimental.patchpoint andllvm.experimental.gc.statepoint) that can be called with an invokeinstruction.

Arguments:

None.

Semantics:

This intrinsic does nothing, and it’s removed by optimizers and ignoredby codegen.

‘llvm.experimental.deoptimize’ Intrinsic

Syntax:
declare type @llvm.experimental.deoptimize(...) [ "deopt"(...) ]
Overview:

This intrinsic, together with deoptimization operand bundles, allow frontends to express transfer of control andframe-local state from the currently executing (typically more specialized,hence faster) version of a function into another (typically more generic, henceslower) version.

In languages with a fully integrated managed runtime like Java and JavaScriptthis intrinsic can be used to implement “uncommon trap” or “side exit” likefunctionality. In unmanaged languages like C and C++, this intrinsic can beused to represent the slow paths of specialized functions.

Arguments:

The intrinsic takes an arbitrary number of arguments, whose meaning isdecided by the lowering strategy.

Semantics:

The @llvm.experimental.deoptimize intrinsic executes an attacheddeoptimization continuation (denoted using a deoptimizationoperand bundle) and returns the value returned bythe deoptimization continuation. Defining the semantic properties ofthe continuation itself is out of scope of the language reference –as far as LLVM is concerned, the deoptimization continuation caninvoke arbitrary side effects, including reading from and writing tothe entire heap.

Deoptimization continuations expressed using "deopt" operand bundles alwayscontinue execution to the end of the physical frame containing them, so allcalls to @llvm.experimental.deoptimize must be in “tail position”:

  • @llvm.experimental.deoptimize cannot be invoked.
  • The call must immediately precede a ret instruction.
  • The ret instruction must return the value produced by the@llvm.experimental.deoptimize call if there is one, or void.

Note that the above restrictions imply that the return type for a call to@llvm.experimental.deoptimize will match the return type of its immediatecaller.

The inliner composes the "deopt" continuations of the caller into the"deopt" continuations present in the inlinee, and also updates calls to thisintrinsic to return directly from the frame of the function it inlined into.

All declarations of @llvm.experimental.deoptimize must share thesame calling convention.

Lowering:

Calls to @llvm.experimental.deoptimize are lowered to calls to thesymbol __llvm_deoptimize (it is the frontend’s responsibility toensure that this symbol is defined). The call arguments to@llvm.experimental.deoptimize are lowered as if they were formalarguments of the specified types, and not as varargs.

‘llvm.experimental.guard’ Intrinsic

Syntax:
declare void @llvm.experimental.guard(i1, ...) [ "deopt"(...) ]
Overview:

This intrinsic, together with deoptimization operand bundles, allows frontends to express guards or checks onoptimistic assumptions made during compilation. The semantics of@llvm.experimental.guard is defined in terms of@llvm.experimental.deoptimize – its body is defined to beequivalent to:

define void @llvm.experimental.guard(i1 %pred, <args...>) {
  %realPred = and i1 %pred, undef
  br i1 %realPred, label %continue, label %leave [, !make.implicit !{}]

leave:
  call void @llvm.experimental.deoptimize(<args...>) [ "deopt"() ]
  ret void

continue:
  ret void
}

with the optional [, !make.implicit !{}] present if and only if itis present on the call site. For more details on !make.implicit,see FaultMaps and implicit checks.

In words, @llvm.experimental.guard executes the attached"deopt" continuation if (but not only if) its first argumentis false. Since the optimizer is allowed to replace the undefwith an arbitrary value, it can optimize guard to fail “spuriously”,i.e. without the original condition being false (hence the “not onlyif”); and this allows for “check widening” type optimizations.

@llvm.experimental.guard cannot be invoked.

After @llvm.experimental.guard was first added, a more generalformulation was found in @llvm.experimental.widenable.condition.Support for @llvm.experimental.guard is slowly being rephrased interms of this alternate.

‘llvm.experimental.widenable.condition’ Intrinsic

Syntax:
declare i1 @llvm.experimental.widenable.condition()
Overview:

This intrinsic represents a “widenable condition” which isboolean expressions with the following property: whether thisexpression is true or false, the program is correct andwell-defined.

Together with deoptimization operand bundles,@llvm.experimental.widenable.condition allows frontends toexpress guards or checks on optimistic assumptions made duringcompilation and represent them as branch instructions on specialconditions.

While this may appear similar in semantics to undef, it is verydifferent in that an invocation produces a particular, singularvalue. It is also intended to be lowered late, and remain availablefor specific optimizations and transforms that can benefit from itsspecial properties.

Arguments:

None.

Semantics:

The intrinsic @llvm.experimental.widenable.condition()returns either true or false. For each evaluation of a callto this intrinsic, the program must be valid and correct both ifit returns true and if it returns false. This allowstransformation passes to replace evaluations of this intrinsicwith either value whenever one is beneficial.

When used in a branch condition, it allows us to choose betweentwo alternative correct solutions for the same problem, likein example below:

  %cond = call i1 @llvm.experimental.widenable.condition()
  br i1 %cond, label %solution_1, label %solution_2

label %fast_path:
  ; Apply memory-consuming but fast solution for a task.

label %slow_path:
  ; Cheap in memory but slow solution.

Whether the result of intrinsic’s call is true or false,it should be correct to pick either solution. We can switchbetween them by replacing the result of@llvm.experimental.widenable.condition with differenti1 expressions.

This is how it can be used to represent guards as widenable branches:

block:
  ; Unguarded instructions
  call void @llvm.experimental.guard(i1 %cond, <args...>) ["deopt"(<deopt_args...>)]
  ; Guarded instructions

Can be expressed in an alternative equivalent form of explicit branch using@llvm.experimental.widenable.condition:

block:
  ; Unguarded instructions
  %widenable_condition = call i1 @llvm.experimental.widenable.condition()
  %guard_condition = and i1 %cond, %widenable_condition
  br i1 %guard_condition, label %guarded, label %deopt

guarded:
  ; Guarded instructions

deopt:
  call type @llvm.experimental.deoptimize(<args...>) [ "deopt"(<deopt_args...>) ]

So the block guarded is only reachable when %cond is true,and it should be valid to go to the block deopt whenever %cond_is _true or false.

@llvm.experimental.widenable.condition will never throw, thusit cannot be invoked.

Guard widening:

When @llvm.experimental.widenable.condition() is used incondition of a guard represented as explicit branch, it islegal to widen the guard’s condition with any additionalconditions.

Guard widening looks like replacement of

%widenable_cond = call i1 @llvm.experimental.widenable.condition()
%guard_cond = and i1 %cond, %widenable_cond
br i1 %guard_cond, label %guarded, label %deopt

with

%widenable_cond = call i1 @llvm.experimental.widenable.condition()
%new_cond = and i1 %any_other_cond, %widenable_cond
%new_guard_cond = and i1 %cond, %new_cond
br i1 %new_guard_cond, label %guarded, label %deopt

for this branch. Here %any_other_cond is an arbitrarily chosenwell-defined i1 value. By making guard widening, we mayimpose stricter conditions on guarded block and bail to thedeopt when the new condition is not met.

Lowering:

Default lowering strategy is replacing the result ofcall of @llvm.experimental.widenable.condition withconstant true. However it is always correct to replaceit with any other i1 value. Any pass canfreely do it if it can benefit from non-default lowering.

‘llvm.load.relative’ Intrinsic

Syntax:
declare i8* @llvm.load.relative.iN(i8* %ptr, iN %offset) argmemonly nounwind readonly
Overview:

This intrinsic loads a 32-bit value from the address %ptr + %offset,adds %ptr to that value and returns it. The constant folder specificallyrecognizes the form of this intrinsic and the constant initializers it mayload from; if a loaded constant initializer is known to have the formi32 trunc(x - %ptr), the intrinsic call is folded to x.

LLVM provides that the calculation of such a constant initializer willnot overflow at link time under the medium code model if x is anunnamed_addr function. However, it does not provide this guarantee fora constant initializer folded into a function body. This intrinsic can beused to avoid the possibility of overflows when loading from such a constant.

‘llvm.sideeffect’ Intrinsic

Syntax:
declare void @llvm.sideeffect() inaccessiblememonly nounwind
Overview:

The llvm.sideeffect intrinsic doesn’t perform any operation. Optimizerstreat it as having side effects, so it can be inserted into a loop toindicate that the loop shouldn’t be assumed to terminate (which couldpotentially lead to the loop being optimized away entirely), even if it’san infinite loop with no other side effects.

Arguments:

None.

Semantics:

This intrinsic actually does nothing, but optimizers must assume that ithas externally observable side effects.

‘llvm.is.constant.*’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.is.constant with any argument type.

declare i1 @llvm.is.constant.i32(i32 %operand) nounwind readnone
declare i1 @llvm.is.constant.f32(float %operand) nounwind readnone
declare i1 @llvm.is.constant.TYPENAME(TYPE %operand) nounwind readnone
Overview:

The ‘llvm.is.constant’ intrinsic will return true if the argumentis known to be a manifest compile-time constant. It is guaranteed tofold to either true or false before generating machine code.

Semantics:

This intrinsic generates no code. If its argument is known to be amanifest compile-time constant value, then the intrinsic will beconverted to a constant true value. Otherwise, it will be converted toa constant false value.

In particular, note that if the argument is a constant expressionwhich refers to a global (the address of which is a constant, butnot manifest during the compile), then the intrinsic evaluates tofalse.

The result also intentionally depends on the result of optimizationpasses – e.g., the result can change depending on whether afunction gets inlined or not. A function’s parameters areobviously not constant. However, a call likellvm.is.constant.i32(i32 %param) can return true after thefunction is inlined, if the value passed to the function parameter wasa constant.

On the other hand, if constant folding is not run, it will neverevaluate to true, even in simple cases.

‘llvm.ptrmask’ Intrinsic

Syntax:
declare ptrty llvm.ptrmask(ptrty %ptr, intty %mask) readnone speculatable
Arguments:

The first argument is a pointer. The second argument is an integer.

Overview:

The llvm.ptrmask intrinsic masks out bits of the pointer according to a mask.This allows stripping data from tagged pointers without converting them to aninteger (ptrtoint/inttoptr). As a consequence, we can preserve more informationto facilitate alias analysis and underlying-object detection.

Semantics:

The result of ptrmask(ptr, mask) is equivalent togetelementptr ptr, (ptrtoint(ptr) & mask) - ptrtoint(ptr). Both the returnedpointer and the first argument are based on the same underlying object (for moreinformation on the based on terminology seethe pointer aliasing rules). If the bitwidth of themask argument does not match the pointer size of the target, the mask iszero-extended or truncated accordingly.

‘llvm.vscale’ Intrinsic

Syntax:
declare i32 llvm.vscale.i32()
declare i64 llvm.vscale.i64()
Overview:

The llvm.vscale intrinsic returns the value for vscale in scalablevectors such as <vscale x 16 x i8>.

Semantics:

vscale is a positive value that is constant throughout programexecution, but is unknown at compile time.If the result value does not fit in the result type, then the result isa poison value.

Stack Map Intrinsics

LLVM provides experimental intrinsics to support runtime patchingmechanisms commonly desired in dynamic language JITs. These intrinsicsare described in Stack maps and patch points in LLVM.

Element Wise Atomic Memory Intrinsics

These intrinsics are similar to the standard library memory intrinsics exceptthat they perform memory transfer as a sequence of atomic memory accesses.

‘llvm.memcpy.element.unordered.atomic’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.memcpy.element.unordered.atomic onany integer bit width and for different address spaces. Not all targetssupport all bit widths however.

declare void @llvm.memcpy.element.unordered.atomic.p0i8.p0i8.i32(i8* <dest>,
                                                                 i8* <src>,
                                                                 i32 <len>,
                                                                 i32 <element_size>)
declare void @llvm.memcpy.element.unordered.atomic.p0i8.p0i8.i64(i8* <dest>,
                                                                 i8* <src>,
                                                                 i64 <len>,
                                                                 i32 <element_size>)
Overview:

The ‘llvm.memcpy.element.unordered.atomic.’ intrinsic is a specialization of the‘llvm.memcpy.’ intrinsic. It differs in that the dest and src are treatedas arrays with elements that are exactly element_size bytes, and the copy betweenbuffers uses a sequence of unordered atomic load/store operationsthat are a positive integer multiple of the element_size in size.

Arguments:

The first three arguments are the same as they are in the @llvm.memcpyintrinsic, with the added constraint that len is required to be a positive integermultiple of the element_size. If len is not a positive integer multiple ofelement_size, then the behaviour of the intrinsic is undefined.

element_size must be a compile-time constant positive power of two no greater thantarget-specific atomic access size limit.

For each of the input pointers align parameter attribute must be specified. Itmust be a power of two no less than the element_size. Caller guarantees thatboth the source and destination pointers are aligned to that boundary.

Semantics:

The ‘llvm.memcpy.element.unordered.atomic.*’ intrinsic copies len bytes ofmemory from the source location to the destination location. These locations are notallowed to overlap. The memory copy is performed as a sequence of load/store operationswhere each access is guaranteed to be a multiple of element_size bytes wide andaligned at an element_size boundary.

The order of the copy is unspecified. The same value may be read from the sourcebuffer many times, but only one write is issued to the destination buffer perelement. It is well defined to have concurrent reads and writes to both source anddestination provided those reads and writes are unordered atomic when specified.

This intrinsic does not provide any additional ordering guarantees over thoseprovided by a set of unordered loads from the source location and stores to thedestination.

Lowering:

In the most general case call to the ‘llvm.memcpy.element.unordered.atomic.’ islowered to a call to the symbol _llvm_memcpy_element_unordered_atomic. Where ‘*’is replaced with an actual element size.

Optimizer is allowed to inline memory copy when it’s profitable to do so.

‘llvm.memmove.element.unordered.atomic’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can usellvm.memmove.element.unordered.atomic on any integer bit width and fordifferent address spaces. Not all targets support all bit widths however.

declare void @llvm.memmove.element.unordered.atomic.p0i8.p0i8.i32(i8* <dest>,
                                                                  i8* <src>,
                                                                  i32 <len>,
                                                                  i32 <element_size>)
declare void @llvm.memmove.element.unordered.atomic.p0i8.p0i8.i64(i8* <dest>,
                                                                  i8* <src>,
                                                                  i64 <len>,
                                                                  i32 <element_size>)
Overview:

The ‘llvm.memmove.element.unordered.atomic.’ intrinsic is a specializationof the ‘llvm.memmove.’ intrinsic. It differs in that the dest andsrc are treated as arrays with elements that are exactly element_sizebytes, and the copy between buffers uses a sequence ofunordered atomic load/store operations that are a positiveinteger multiple of the element_size in size.

Arguments:

The first three arguments are the same as they are in the@llvm.memmove intrinsic, with the added constraint thatlen is required to be a positive integer multiple of the element_size.If len is not a positive integer multiple of element_size, then thebehaviour of the intrinsic is undefined.

element_size must be a compile-time constant positive power of two nogreater than a target-specific atomic access size limit.

For each of the input pointers the align parameter attribute must bespecified. It must be a power of two no less than the element_size. Callerguarantees that both the source and destination pointers are aligned to thatboundary.

Semantics:

The ‘llvm.memmove.element.unordered.atomic.*’ intrinsic copies len bytesof memory from the source location to the destination location. These locationsare allowed to overlap. The memory copy is performed as a sequence of load/storeoperations where each access is guaranteed to be a multiple of element_sizebytes wide and aligned at an element_size boundary.

The order of the copy is unspecified. The same value may be read from the sourcebuffer many times, but only one write is issued to the destination buffer perelement. It is well defined to have concurrent reads and writes to both sourceand destination provided those reads and writes are unordered atomic whenspecified.

This intrinsic does not provide any additional ordering guarantees over thoseprovided by a set of unordered loads from the source location and stores to thedestination.

Lowering:

In the most general case call to the‘llvm.memmove.element.unordered.atomic.’ is lowered to a call to the symbol_llvm_memmove_element_unordered_atomic. Where ‘*’ is replaced with anactual element size.

The optimizer is allowed to inline the memory copy when it’s profitable to do so.

‘llvm.memset.element.unordered.atomic’ Intrinsic

Syntax:

This is an overloaded intrinsic. You can use llvm.memset.element.unordered.atomic onany integer bit width and for different address spaces. Not all targetssupport all bit widths however.

declare void @llvm.memset.element.unordered.atomic.p0i8.i32(i8* <dest>,
                                                            i8 <value>,
                                                            i32 <len>,
                                                            i32 <element_size>)
declare void @llvm.memset.element.unordered.atomic.p0i8.i64(i8* <dest>,
                                                            i8 <value>,
                                                            i64 <len>,
                                                            i32 <element_size>)
Overview:

The ‘llvm.memset.element.unordered.atomic.’ intrinsic is a specialization of the‘llvm.memset.’ intrinsic. It differs in that the dest is treated as an arraywith elements that are exactly element_size bytes, and the assignment to that arrayuses uses a sequence of unordered atomic store operationsthat are a positive integer multiple of the element_size in size.

Arguments:

The first three arguments are the same as they are in the @llvm.memsetintrinsic, with the added constraint that len is required to be a positive integermultiple of the element_size. If len is not a positive integer multiple ofelement_size, then the behaviour of the intrinsic is undefined.

element_size must be a compile-time constant positive power of two no greater thantarget-specific atomic access size limit.

The dest input pointer must have the align parameter attribute specified. Itmust be a power of two no less than the element_size. Caller guarantees thatthe destination pointer is aligned to that boundary.

Semantics:

The ‘llvm.memset.element.unordered.atomic.*’ intrinsic sets the len bytes ofmemory starting at the destination location to the given value. The memory isset with a sequence of store operations where each access is guaranteed to be amultiple of element_size bytes wide and aligned at an element_size boundary.

The order of the assignment is unspecified. Only one write is issued to thedestination buffer per element. It is well defined to have concurrent reads andwrites to the destination provided those reads and writes are unordered atomicwhen specified.

This intrinsic does not provide any additional ordering guarantees over thoseprovided by a set of unordered stores to the destination.

Lowering:

In the most general case call to the ‘llvm.memset.element.unordered.atomic.’ islowered to a call to the symbol _llvm_memset_element_unordered_atomic. Where ‘*’is replaced with an actual element size.

The optimizer is allowed to inline the memory assignment when it’s profitable to do so.

Objective-C ARC Runtime Intrinsics

LLVM provides intrinsics that lower to Objective-C ARC runtime entry points.LLVM is aware of the semantics of these functions, and optimizes based on thatknowledge. You can read more about the details of Objective-C ARC here.

‘llvm.objc.autorelease’ Intrinsic

Syntax:
declare i8* @llvm.objc.autorelease(i8*)
Lowering:

Lowers to a call to objc_autorelease.

‘llvm.objc.autoreleasePoolPop’ Intrinsic

Syntax:
declare void @llvm.objc.autoreleasePoolPop(i8*)
Lowering:

Lowers to a call to objc_autoreleasePoolPop.

‘llvm.objc.autoreleasePoolPush’ Intrinsic

Syntax:
declare i8* @llvm.objc.autoreleasePoolPush()
Lowering:

Lowers to a call to objc_autoreleasePoolPush.

‘llvm.objc.autoreleaseReturnValue’ Intrinsic

Syntax:
declare i8* @llvm.objc.autoreleaseReturnValue(i8*)
Lowering:

Lowers to a call to objc_autoreleaseReturnValue.

‘llvm.objc.copyWeak’ Intrinsic

Syntax:
declare void @llvm.objc.copyWeak(i8**, i8**)
Lowering:

Lowers to a call to objc_copyWeak.

‘llvm.objc.destroyWeak’ Intrinsic

Syntax:
declare void @llvm.objc.destroyWeak(i8**)
Lowering:

Lowers to a call to objc_destroyWeak.

‘llvm.objc.initWeak’ Intrinsic

Syntax:
declare i8* @llvm.objc.initWeak(i8**, i8*)
Lowering:

Lowers to a call to objc_initWeak.

‘llvm.objc.loadWeak’ Intrinsic

Syntax:
declare i8* @llvm.objc.loadWeak(i8**)
Lowering:

Lowers to a call to objc_loadWeak.

‘llvm.objc.loadWeakRetained’ Intrinsic

Syntax:
declare i8* @llvm.objc.loadWeakRetained(i8**)
Lowering:

Lowers to a call to objc_loadWeakRetained.

‘llvm.objc.moveWeak’ Intrinsic

Syntax:
declare void @llvm.objc.moveWeak(i8**, i8**)
Lowering:

Lowers to a call to objc_moveWeak.

‘llvm.objc.release’ Intrinsic

Syntax:
declare void @llvm.objc.release(i8*)
Lowering:

Lowers to a call to objc_release.

‘llvm.objc.retain’ Intrinsic

Syntax:
declare i8* @llvm.objc.retain(i8*)
Lowering:

Lowers to a call to objc_retain.

‘llvm.objc.retainAutorelease’ Intrinsic

Syntax:
declare i8* @llvm.objc.retainAutorelease(i8*)
Lowering:

Lowers to a call to objc_retainAutorelease.

‘llvm.objc.retainAutoreleaseReturnValue’ Intrinsic

Syntax:
declare i8* @llvm.objc.retainAutoreleaseReturnValue(i8*)
Lowering:

Lowers to a call to objc_retainAutoreleaseReturnValue.

‘llvm.objc.retainAutoreleasedReturnValue’ Intrinsic

Syntax:
declare i8* @llvm.objc.retainAutoreleasedReturnValue(i8*)
Lowering:

Lowers to a call to objc_retainAutoreleasedReturnValue.

‘llvm.objc.retainBlock’ Intrinsic

Syntax:
declare i8* @llvm.objc.retainBlock(i8*)
Lowering:

Lowers to a call to objc_retainBlock.

‘llvm.objc.storeStrong’ Intrinsic

Syntax:
declare void @llvm.objc.storeStrong(i8**, i8*)
Lowering:

Lowers to a call to objc_storeStrong.

‘llvm.objc.storeWeak’ Intrinsic

Syntax:
declare i8* @llvm.objc.storeWeak(i8**, i8*)
Lowering:

Lowers to a call to objc_storeWeak.

Preserving Debug Information Intrinsics

These intrinsics are used to carry certain debuginfo together withIR-level operations. For example, it may be desirable toknow the structure/union name and the original user-level fieldindices. Such information got lost in IR GetElementPtr instructionsince the IR types are different from debugInfo types and unionsare converted to structs in IR.

‘llvm.preserve.array.access.index’ Intrinsic

Syntax:
declare <ret_type>
@llvm.preserve.array.access.index.p0s_union.anons.p0a10s_union.anons(<type> base,
                                                                     i32 dim,
                                                                     i32 index)
Overview:

The ‘llvm.preserve.array.access.index’ intrinsic returns the getelementptr addressbased on array base base, array dimension dim and the last access index indexinto the array. The return type ret_type is a pointer type to the array element.The array dim and index are preserved which is more robust thangetelementptr instruction which may be subject to compiler transformation.The llvm.preserve.access.index type of metadata is attached to this call instructionto provide array or pointer debuginfo type.The metadata is a DICompositeType or DIDerivedType representing thedebuginfo version of type.

Arguments:

The base is the array base address. The dim is the array dimension.The base is a pointer if dim equals 0.The index is the last access index into the array or pointer.

Semantics:

The ‘llvm.preserve.array.access.index’ intrinsic produces the same resultas a getelementptr with base base and access operands {dim's 0's, index}.

‘llvm.preserve.union.access.index’ Intrinsic

Syntax:
declare <type>
@llvm.preserve.union.access.index.p0s_union.anons.p0s_union.anons(<type> base,
                                                                  i32 di_index)
Overview:

The ‘llvm.preserve.union.access.index’ intrinsic carries the debuginfo field indexdi_index and returns the base address.The llvm.preserve.access.index type of metadata is attached to this call instructionto provide union debuginfo type.The metadata is a DICompositeType representing the debuginfo version of type.The return type type is the same as the base type.

Arguments:

The base is the union base address. The di_index is the field index in debuginfo.

Semantics:

The ‘llvm.preserve.union.access.index’ intrinsic returns the base address.

‘llvm.preserve.struct.access.index’ Intrinsic

Syntax:
declare <ret_type>
@llvm.preserve.struct.access.index.p0i8.p0s_struct.anon.0s(<type> base,
                                                           i32 gep_index,
                                                           i32 di_index)
Overview:

The ‘llvm.preserve.struct.access.index’ intrinsic returns the getelementptr addressbased on struct base base and IR struct member index gep_index.The llvm.preserve.access.index type of metadata is attached to this call instructionto provide struct debuginfo type.The metadata is a DICompositeType representing the debuginfo version of type.The return type ret_type is a pointer type to the structure member.

Arguments:

The base is the structure base address. The gep_index is the struct member indexbased on IR structures. The di_index is the struct member index based on debuginfo.

Semantics:

The ‘llvm.preserve.struct.access.index’ intrinsic produces the same resultas a getelementptr with base base and access operands {0, gep_index}.